# NER&RE ## EntityType 1. Malware (B、I) 2. Organization (B、I) 3. Application (B、I) 4. OS (B、I) 5. Person (B、I) 6. location (B、I) 7. Time (B、I) 8. MalwareType (B、I) 9. ThreatActor (B、I) 10. O ## RelationType 1. noRelation : * e1 (noRelation) e2 2. isA : * Malware (isA) MalwareFamily * Malware (isA) MalwareType 3. targets : * Malware (targets) Location * Malware (targets) OS * Malware (targets) Application * ThreatActor (targets) Location 4. uses : * Malware (uses) Application * Malware (uses) AttackPattern 5. hasAuthor : * Malware (hasAuthor) ThreatActor 6. has : * Malware (has) Malware * ThreatActor (has) Organization 7. variantOf : * Malware (variantOf) Malware 8. hasAlias : * Malware (hasAlias) Malware 9. indicates : * IoC (indicates) Malware 10. discoveredIn : * Malware (discoveredIn) Time 11. exploits : * Malware (exploits) CVE e.g. 1. <e1>Pegasus</e1> , the assault package leverages three zero-day vulnerabilities to remotely jailbreak and install a suite of monitoring software onto a victim 's device.One of the key tools in the process is an exploit that takes advantage of a < e2 > memory corruption flaw < /e2 > in Safari WebKit . (Malware (exploits) ?) 2. < e1 > <e1>RCSAndroid</e1> < /e1 > was known about as far back as 2012.It uses two known vulnerabilities in the default Android Internet browser found in Android versions 4.0 to 4.3 ( CVE-2012-2825 and < e2 > CVE-2012-2871 < /e2 >. (Malware (exploits) ?) 3. <e1>RCSAndroid</e1> uses two different methods to infect devices.1.Hacking Team used text and email messages containing specially crafted URLs that triggered exploits for several vulnerabilities (CVE-2012-2825 and <e2>CVE-2012-2871</e2>) present in the default browsers of Android 4.(Malware (exploits) ?) 4. < e1 > <e1>Pegasus</e1> < /e1 > by exploiting a zero-day in feature for iPhone.The phones were compromised using an exploit chain that we call < e2 > KISMET < /e2 > .(Malware (exploits ?)) ## Reference 1. [Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI](https://arxiv.org/pdf/2211.01753)