Dataset Viewer
Auto-converted to Parquet Duplicate
task_type
stringclasses
1 value
url
stringlengths
33
171
description
stringlengths
1.12k
28.6k
prompt
stringlengths
1.63k
29.1k
threat_actor_attribution
https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/
SEQRITE Labs APT-Team has discovered multiple campaigns of APT [PLACEHOLDER], targeting Indian government and defense entities in the past few months. The threat group is now exploiting the recent WinRAR vulnerability CVE-2023-38831 (See our advisory for more details) to deploy AllaKore RAT, DRat and additional payload...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://csirt-cti.net/2024/01/23/stately-taurus-targets-myanmar/
The recent ethnic rebel attacks in Myanmar have put the Myanmar junta and surrounding countries on high alert. Since October 2023, a rebel alliance called the Three Brotherhood Alliance (3BHA) has been attacking Myanmar’s military across its northern regions, reportedly seizing its junta outposts and military positions...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/
An advanced persistent threat (APT) group suspected with moderate-high confidence to be [PLACEHOLDER] engaged in a number of cyberespionage intrusions targeting a government in Southeast Asia. The intrusions took place from at least the second quarter of 2021 to the third quarter of 2023. Based on our observations and ...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://medium.com/@zyadlzyatsoc/comprehensive-analysis-of-emotet-malware-part-1-by-zyad-elzyat-35d5cf33a3c0
[PLACEHOLDER], a notorious name in the realm of cyber threats, has loomed large over the digital landscape since its inception in 2014. Originally identified as a banking Trojan focused on financial data theft, [PLACEHOLDER] has evolved into a highly adaptable and multifaceted malware, capable of causing widespread dis...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://www.fortinet.com/blog/threat-research/bandook-persistent-threat-that-keeps-evolving
Bandook malware is a remote access trojan that has been continuously developed since it was first detected in 2007. It has been used in various campaigns by different threat actors over the years. FortiGuard Labs identified a new Bandook variant being distributed via a PDF file this past October. This PDF file contains...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://research.checkpoint.com/2024/sharp-dragon-expands-towards-africa-and-the-caribbean/
Since 2021, Check Point Research has been closely monitoring the activities of [PLACEHOLDER], a Chinese threat actor. Historical activities mostly consist of highly-targeted phishing emails, previously leading to the deployment of VictoryDLL or Soul framework. While the final payloads [PLACEHOLDER] operators have de...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor [PLACEHOLDER] misusing the client management tool Quick Assist to target users in social engineering attacks. [PLACEHOLDER] is a financially motivated cybercriminal group known to deploy [PLACEHOLDER] ransomware. The observed activity beg...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia
[PLACEHOLDER] has been actively targeting organizations in Colombia and Ecuador since at least 2019. It relies on spear-phishing emails sent to specific and strategic companies to conduct its campaigns. On Feb. 20, the BlackBerry Research and Intelligence team witnessed a new campaign where the threat actor impersonate...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
threat_actor_attribution
https://research.checkpoint.com/2023/blindeagle-targeting-ecuador-with-sharpened-tools/
"ACTIVE CAMPAIGNS AGAINST COLOMBIAN TARGETS For the last few months, we have been observing the ong(...TRUNCATED)
"You are given a threat report that describes a cyber incident. Any direct mentions of the threat ac(...TRUNCATED)
threat_actor_attribution
https://cloud.google.com/blog/topics/threat-intelligence/turla-galaxy-opportunity/
"USB Spreading As Mandiant recently wrote about in our blog post, Always Another Secret: Lifting th(...TRUNCATED)
"You are given a threat report that describes a cyber incident. Any direct mentions of the threat ac(...TRUNCATED)
End of preview. Expand in Data Studio

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

CTI-Bench: Threat Actor Attribution (TAA)

Dataset Description

This dataset contains 50 examples for threat actor attribution tasks. It evaluates a model's ability to identify and attribute cyber attacks to specific threat actors based on attack patterns, techniques, and indicators.

Dataset Structure

Each example contains:

  • task_type: Always "threat_actor_attribution"
  • Additional fields vary based on the specific attribution task
  • Common fields include threat descriptions, attack patterns, and attribution targets

Usage

from datasets import load_dataset

# Load the dataset
dataset = load_dataset("tuandunghcmut/cti_bench_taa")

# Access a sample
sample = dataset['train'][0]
print(f"Task: {sample['task_type']}")

Attribution Categories

The dataset may cover attribution to:

  • APT Groups: Advanced Persistent Threat organizations
  • Nation-State Actors: Government-sponsored cyber units
  • Cybercriminal Organizations: Profit-motivated threat groups
  • Hacktivist Groups: Ideologically motivated actors

Citation

@article{ctibench2024,
  title={CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence},
  author={[Authors]},
  journal={NeurIPS 2024},
  year={2024}
}

Original Source

This dataset is derived from CTI-Bench and is available under the same license terms.

Tasks

This dataset is designed for:

  • ✅ Threat actor identification
  • ✅ Attribution analysis
  • ✅ Attack pattern recognition
  • ✅ Intelligence correlation
Downloads last month
4

Collection including tuandunghcmut/cti_bench_taa