AZERG
Collection
Datasets and models for our paper: "From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction"
•
12 items
•
Updated
This model is a fine-tuned version of mistralai/Mistral-7B-Instruct-v0.3 specialized for Cyber Threat Intelligence (CTI) tasks. It was trained on the AZERG Dataset covering a mixture of all four tasks required for STIX data generation:
This is the most versatile model in the AZERG collection, capable of handling all STIX extraction sub-tasks.
This model is intended to be used within the AZERG framework to extract STIX entities and relationships from security reports. Please check the exact prompts in the framework.
Example Prompt (Task 1: Entity Detection):
Instruction:
You are a helpful threat intelligence analyst. Your task is to extract all STIX entities mentioned in the input. To help you, here is a list of the possible STIX entity types.
STIX entity types:
- ATTACK_PATTERN: A type of TTP that describes ways that adversaries attempt to compromise targets. (e.g., T1051, T1548.001, etc.)
[...]
Answer in the following format: <entities>LIST OF IDENTIFIED ENTITIES SEPARATED BY PIPE |</entities>
Input:
- Text Passage: [INPUT TEXT]
Response:
If you use this model, please cite our paper:
@article{lekssays2025azerg,
title={From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction},
author={Lekssays, Ahmed and Sencar, Husrev Taha and Yu, Ting},
journal={arXiv preprint arXiv:2507.16576},
year={2025}
}