The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.
Ransomware Playbooks - English Dataset
A comprehensive bilingual (FR/EN) dataset containing detailed and operational information about ransomware groups, incident response playbooks, and structured Q&A on cybersecurity and ransomware attack response.
Overview
This dataset provides a complete resource for security teams, CISOs, and DFIR (Digital Forensics and Incident Response) professionals to understand, detect, and respond to modern ransomware attacks.
Main Content
1. 40+ Ransomware Groups (data_ransomware_groups.py)
Detailed profiles of active and historical ransomware families:
- LockBit 3.0 - Dominant group shaping ransomware landscape with sophisticated RaaS infrastructure
- BlackCat/ALPHV - Rust-based ransomware with evolving techniques
- Cl0p - Zero-day supply-chain vulnerability exploiter
- Royal - SME-focused approach with distributed infrastructure
- Play - Rapid attacks with no communication timeframe
- Akira - Emerging group leveraging VPN vulnerabilities
- BlackBasta - Professional group offering premium RaaS services
- Rhysida - Emerging group targeting public sector
- Medusa - Evasive techniques against modern EDR
- Vice Society - Healthcare/education focus without systematic encryption
- Hive - Sophisticated RaaS platform (dismantled)
- Conti - Historical ransomware landscape dominator (dissolved)
- ... and 26 more groups
Fields per group:
id: unique identifiername: group/family namealiases: list of aliases usedfirst_seen: year of first observationstatus: Active, Disbanded, Rebrandeddescription_fr/description_en: bilingual descriptionsttps_fr/ttps_en: detailed tactics, techniques, proceduresinitial_access_vector: Phishing, RDP, VPN_Exploit, Supply_Chain, Drive_Byencryption_type: AES-256, RSA-2048, ChaCha20, Hybriddouble_extortion/triple_extortion: booleanstargeted_sectors: Healthcare, Finance, Government, Manufacturing, Educationmitre_techniques: MITRE ATT&CK ID list (T1566, T1190, T1021, etc.)iocs: indicators of compromise (domains, extensions, ransom notes)
2. 20 Incident Response Playbooks (data_playbooks.py)
Step-by-step operational procedures for 6 incident response phases:
Playbooks by phase:
Preparation:
- EDR & Security Hardening - Detection infrastructure hardening
- Incident Response Plan Development - Documented response plan
- Backup & Recovery Strategy - 3-2-1 isolated backup strategy
Detection: 4. Anomaly Detection & Alerting - ML detection and event correlation 5. File Integrity Monitoring - Critical file integrity monitoring
Containment: 6. Network Segmentation & Isolation - Infected systems isolation via VLAN 7. Credential Management & Reset - Compromised credentials reset 8. Malicious Process Termination - Malicious process termination
Eradication: 9. Complete Malware Eradication - Complete malware removal 10. Vulnerability Patching & Hardening - Exploitation vulnerability fixes 11. Network Infrastructure Cleanup - Network cleanup (C2, DNS)
Recovery: 12. System Restoration from Backups - Restoration from backups 13. Application & Data Validation - Restored app/data validation 14. Business Continuity Restoration - Business continuity restoration
Lessons Learned: 15. Post-Incident Forensic Analysis - Complete post-incident forensic analysis 16. Threat Intelligence & Attribution - Group attribution and intelligence sharing 17. Incident Review & Process Improvement - Post-mortem review and improvement 18. Security Culture & Training Enhancement - Awareness improvement
Fields per playbook:
id: unique identifiername: playbook namephase: Preparation, Detection, Containment, Eradication, Recovery, LessonsLearneddescription_fr/description_en: bilingual descriptionssteps: action list (step_num, action_fr, action_en, responsible, priority)tools_required: required toolsdecision_tree_fr/decision_tree_en: if/then decision tree
3. 50 French Q&A (data_qa_fr.py)
Structured questions-answers covering all ransomware aspects in French
4. 50 English Q&A (data_qa_en.py)
Structured questions-answers covering all ransomware aspects in English:
- Ransomware attack anatomy
- Initial access vectors
- Encryption techniques
- Detection and alerting
- Forensic investigation
- DFIR tools
- Anti-forensics
- EDR/XDR solutions
- Defense strategies
- Incident response planning
- Compliance and insurance
- Personnel awareness
Fields per Q&A:
id: unique identifierquestion: question in languageanswer: detailed answersource_url: link to complete source articlekeywords: indexing keywords
Complete Resources
Primary Whitepaper
Complete Anatomy of Ransomware Attack
Comprehensive document covering:
- Historical evolution of ransomware since WannaCry (2017)
- Detailed ransomware attack chain anatomy
- Profiles of 40+ active groups in 2025
- Documented TTP techniques
- Modern detection strategies
- Complete incident response plans
- Real-world attack case studies
Specialized Articles
Forensics: Anti-Forensic Evasion
- Log and artifact deletion
- Fileless malware
- Living-off-the-land binaries
- EDR bypasses
-
- RAM memory analysis with Volatility
- In-memory malware detection
- Runtime info extraction (tokens, keys)
- Essential profiles and commands
Report: Top 10 EDR/XDR Solutions 2025
- Comparison of CrowdStrike, Microsoft Defender, SentinelOne
- Ransomware detection features
- ROI and implementation costs
- Selection matrix by organization size
-
- Volatility, Autopsy, EnCase, FTK
- Wireshark for network analysis
- YARA for pattern matching
- Splunk for log centralization
Author Profile
Cybersecurity, DFIR, threat intelligence expert with experience in Fortune 500 ransomware incident response.
Usage
Installation
# Clone repository
git clone https://github.com/AYI-NEDJIMI/ransomware-playbooks.git
cd ransomware-playbooks
# Install dependencies
pip install pandas pyarrow huggingface_hub
Dataset Generation
# Generate French dataset
python generate_dataset.py fr
# Generate English dataset
python generate_dataset.py en
# Generated files in output_fr/ and output_en/:
# - ransomware_groups.json/.parquet
# - response_playbooks.json/.parquet
# - qa_dataset.json/.parquet
# - combined_dataset.json
# - statistics.json
HuggingFace Upload
# Verify HF token
export HF_TOKEN="your_hf_token"
# Dry-run (see files to upload)
python upload_to_hf.py fr --dry-run
# Actual upload French
python upload_to_hf.py fr
# Actual upload English
python upload_to_hf.py en
Access via HuggingFace Hub
from datasets import load_dataset
# Load French dataset
dataset_fr = load_dataset('AYI-NEDJIMI/ransomware-playbooks-fr')
# Load English dataset
dataset_en = load_dataset('AYI-NEDJIMI/ransomware-playbooks-en')
# Access data
groups = dataset_en['ransomware_groups']
playbooks = dataset_en['playbooks']
qa = dataset_en['qa']
# Filter by active groups
active_groups = [g for g in groups if g['status'] == 'Active']
# Find playbooks by phase
containment_playbooks = [p for p in playbooks if p['phase'] == 'Containment']
Data Format
JSON:
{
"id": "lockbit3",
"name": "LockBit 3.0",
"aliases": ["LockBit", "LockBit Black"],
"first_seen": 2019,
"status": "Active",
"description_en": "...",
"encryption_type": "AES-256",
"double_extortion": true
}
Parquet:
- Columnar format optimized for analytical queries
- Compression and improved performance
- Compatible with Pandas, Polars, DuckDB
Statistics
Ransomware Groups
- Total: 40+ families
- Active: 30+ groups operating in 2025
- Dismantled: 8 groups (Hive, Conti, DarkSide, REvil, etc.)
- Rebranded: 3 groups (Babuk → Tortilla, ALPHV → BlackCat)
Encryption
- AES-256: 85% of groups (fast, standard)
- Hybrid (AES+RSA): 12% of groups (enhanced security)
- ChaCha20: 3% of groups (optimization)
Targeted Sectors
- Finance: 25% of attacks
- Healthcare: 30% (highest volume/impact)
- Government: 20% (critical infrastructure)
- Manufacturing: 18% (production disruption)
- Education: 7% (student data)
Initial Access Vectors
- Phishing: 40% (malicious email)
- Exposed RDP: 25% (brute force)
- VPN/Appliance Exploit: 20% (vulnerabilities)
- Supply-Chain: 10% (trusted partners)
- Drive-By Downloads: 5% (malvertising)
Tags and Collection
Tags:
- ransomware
- incident-response
- threat-intelligence
- malware
- cybersecurity
- dfir
- ayinedjimi-consultants
Collection: Ransomware Security - Complete ransomware resources collection
License
CC-BY-4.0 (Creative Commons Attribution 4.0)
Free to use with attribution to AYI-NEDJIMI Consultants
Changelog
v1.0 (2025-02-13)
- 40+ ransomware group profiles
- 20 incident response playbooks
- 50 French Q&A, 50 English Q&A
- JSON/Parquet support
- HuggingFace Hub integration
Contact & Support
- Website: https://ayinedjimi-consultants.fr
- Bio: https://ayinedjimi-consultants.fr/bio.html
- Email: contact@ayinedjimi-consultants.fr
Contributions & Feedback
Contributions welcome! Please:
- Fork repository
- Create feature branch
- Add/modify data
- Validate JSON syntax
- Submit pull request with description
Last Updated: 2025-02-13 Version: 1.0 Maintained by: AYI-NEDJIMI Consultants
Author
Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert
Related Articles
- Livre Blanc Anatomie Ransomware
- Evasion Anti-Forensique
- Memory Forensics
- Top 10 Solutions EDR/XDR 2025
- Comparatif Outils DFIR
Free Cybersecurity Resources
- Livre Blanc NIS 2
- Livre Blanc Sécurité Active Directory
- Livre Blanc Pentest Cloud AWS/Azure/GCP
- Livre Blanc Sécurité Kubernetes
- Livre Blanc IA Cyberdéfense
- Livre Blanc Anatomie Ransomware
- Guide Sécurisation AD 2025
- Guide Tiering Model AD
Part of the Collection
This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.
- Downloads last month
- 32