Dataset Viewer

The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.

Ransomware Playbooks - English Dataset

A comprehensive bilingual (FR/EN) dataset containing detailed and operational information about ransomware groups, incident response playbooks, and structured Q&A on cybersecurity and ransomware attack response.

Overview

This dataset provides a complete resource for security teams, CISOs, and DFIR (Digital Forensics and Incident Response) professionals to understand, detect, and respond to modern ransomware attacks.

Main Content

1. 40+ Ransomware Groups (data_ransomware_groups.py)

Detailed profiles of active and historical ransomware families:

  • LockBit 3.0 - Dominant group shaping ransomware landscape with sophisticated RaaS infrastructure
  • BlackCat/ALPHV - Rust-based ransomware with evolving techniques
  • Cl0p - Zero-day supply-chain vulnerability exploiter
  • Royal - SME-focused approach with distributed infrastructure
  • Play - Rapid attacks with no communication timeframe
  • Akira - Emerging group leveraging VPN vulnerabilities
  • BlackBasta - Professional group offering premium RaaS services
  • Rhysida - Emerging group targeting public sector
  • Medusa - Evasive techniques against modern EDR
  • Vice Society - Healthcare/education focus without systematic encryption
  • Hive - Sophisticated RaaS platform (dismantled)
  • Conti - Historical ransomware landscape dominator (dissolved)
  • ... and 26 more groups

Fields per group:

  • id: unique identifier
  • name: group/family name
  • aliases: list of aliases used
  • first_seen: year of first observation
  • status: Active, Disbanded, Rebranded
  • description_fr / description_en: bilingual descriptions
  • ttps_fr / ttps_en: detailed tactics, techniques, procedures
  • initial_access_vector: Phishing, RDP, VPN_Exploit, Supply_Chain, Drive_By
  • encryption_type: AES-256, RSA-2048, ChaCha20, Hybrid
  • double_extortion / triple_extortion: booleans
  • targeted_sectors: Healthcare, Finance, Government, Manufacturing, Education
  • mitre_techniques: MITRE ATT&CK ID list (T1566, T1190, T1021, etc.)
  • iocs: indicators of compromise (domains, extensions, ransom notes)

2. 20 Incident Response Playbooks (data_playbooks.py)

Step-by-step operational procedures for 6 incident response phases:

Playbooks by phase:

Preparation:

  1. EDR & Security Hardening - Detection infrastructure hardening
  2. Incident Response Plan Development - Documented response plan
  3. Backup & Recovery Strategy - 3-2-1 isolated backup strategy

Detection: 4. Anomaly Detection & Alerting - ML detection and event correlation 5. File Integrity Monitoring - Critical file integrity monitoring

Containment: 6. Network Segmentation & Isolation - Infected systems isolation via VLAN 7. Credential Management & Reset - Compromised credentials reset 8. Malicious Process Termination - Malicious process termination

Eradication: 9. Complete Malware Eradication - Complete malware removal 10. Vulnerability Patching & Hardening - Exploitation vulnerability fixes 11. Network Infrastructure Cleanup - Network cleanup (C2, DNS)

Recovery: 12. System Restoration from Backups - Restoration from backups 13. Application & Data Validation - Restored app/data validation 14. Business Continuity Restoration - Business continuity restoration

Lessons Learned: 15. Post-Incident Forensic Analysis - Complete post-incident forensic analysis 16. Threat Intelligence & Attribution - Group attribution and intelligence sharing 17. Incident Review & Process Improvement - Post-mortem review and improvement 18. Security Culture & Training Enhancement - Awareness improvement

Fields per playbook:

  • id: unique identifier
  • name: playbook name
  • phase: Preparation, Detection, Containment, Eradication, Recovery, LessonsLearned
  • description_fr / description_en: bilingual descriptions
  • steps: action list (step_num, action_fr, action_en, responsible, priority)
  • tools_required: required tools
  • decision_tree_fr / decision_tree_en: if/then decision tree

3. 50 French Q&A (data_qa_fr.py)

Structured questions-answers covering all ransomware aspects in French

4. 50 English Q&A (data_qa_en.py)

Structured questions-answers covering all ransomware aspects in English:

  • Ransomware attack anatomy
  • Initial access vectors
  • Encryption techniques
  • Detection and alerting
  • Forensic investigation
  • DFIR tools
  • Anti-forensics
  • EDR/XDR solutions
  • Defense strategies
  • Incident response planning
  • Compliance and insurance
  • Personnel awareness

Fields per Q&A:

  • id: unique identifier
  • question: question in language
  • answer: detailed answer
  • source_url: link to complete source article
  • keywords: indexing keywords

Complete Resources

Primary Whitepaper

Complete Anatomy of Ransomware Attack

Comprehensive document covering:

  • Historical evolution of ransomware since WannaCry (2017)
  • Detailed ransomware attack chain anatomy
  • Profiles of 40+ active groups in 2025
  • Documented TTP techniques
  • Modern detection strategies
  • Complete incident response plans
  • Real-world attack case studies

Specialized Articles

  1. Forensics: Anti-Forensic Evasion

    • Log and artifact deletion
    • Fileless malware
    • Living-off-the-land binaries
    • EDR bypasses
  2. Forensics: Memory Forensics

    • RAM memory analysis with Volatility
    • In-memory malware detection
    • Runtime info extraction (tokens, keys)
    • Essential profiles and commands
  3. Report: Top 10 EDR/XDR Solutions 2025

    • Comparison of CrowdStrike, Microsoft Defender, SentinelOne
    • Ransomware detection features
    • ROI and implementation costs
    • Selection matrix by organization size
  4. DFIR: Tools Comparison

    • Volatility, Autopsy, EnCase, FTK
    • Wireshark for network analysis
    • YARA for pattern matching
    • Splunk for log centralization

Author Profile

AYI-NEDJIMI Consultants

Cybersecurity, DFIR, threat intelligence expert with experience in Fortune 500 ransomware incident response.

Usage

Installation

# Clone repository
git clone https://github.com/AYI-NEDJIMI/ransomware-playbooks.git
cd ransomware-playbooks

# Install dependencies
pip install pandas pyarrow huggingface_hub

Dataset Generation

# Generate French dataset
python generate_dataset.py fr

# Generate English dataset
python generate_dataset.py en

# Generated files in output_fr/ and output_en/:
# - ransomware_groups.json/.parquet
# - response_playbooks.json/.parquet
# - qa_dataset.json/.parquet
# - combined_dataset.json
# - statistics.json

HuggingFace Upload

# Verify HF token
export HF_TOKEN="your_hf_token"

# Dry-run (see files to upload)
python upload_to_hf.py fr --dry-run

# Actual upload French
python upload_to_hf.py fr

# Actual upload English
python upload_to_hf.py en

Access via HuggingFace Hub

from datasets import load_dataset

# Load French dataset
dataset_fr = load_dataset('AYI-NEDJIMI/ransomware-playbooks-fr')

# Load English dataset
dataset_en = load_dataset('AYI-NEDJIMI/ransomware-playbooks-en')

# Access data
groups = dataset_en['ransomware_groups']
playbooks = dataset_en['playbooks']
qa = dataset_en['qa']

# Filter by active groups
active_groups = [g for g in groups if g['status'] == 'Active']

# Find playbooks by phase
containment_playbooks = [p for p in playbooks if p['phase'] == 'Containment']

Data Format

JSON:

{
  "id": "lockbit3",
  "name": "LockBit 3.0",
  "aliases": ["LockBit", "LockBit Black"],
  "first_seen": 2019,
  "status": "Active",
  "description_en": "...",
  "encryption_type": "AES-256",
  "double_extortion": true
}

Parquet:

  • Columnar format optimized for analytical queries
  • Compression and improved performance
  • Compatible with Pandas, Polars, DuckDB

Statistics

Ransomware Groups

  • Total: 40+ families
  • Active: 30+ groups operating in 2025
  • Dismantled: 8 groups (Hive, Conti, DarkSide, REvil, etc.)
  • Rebranded: 3 groups (Babuk → Tortilla, ALPHV → BlackCat)

Encryption

  • AES-256: 85% of groups (fast, standard)
  • Hybrid (AES+RSA): 12% of groups (enhanced security)
  • ChaCha20: 3% of groups (optimization)

Targeted Sectors

  1. Finance: 25% of attacks
  2. Healthcare: 30% (highest volume/impact)
  3. Government: 20% (critical infrastructure)
  4. Manufacturing: 18% (production disruption)
  5. Education: 7% (student data)

Initial Access Vectors

  1. Phishing: 40% (malicious email)
  2. Exposed RDP: 25% (brute force)
  3. VPN/Appliance Exploit: 20% (vulnerabilities)
  4. Supply-Chain: 10% (trusted partners)
  5. Drive-By Downloads: 5% (malvertising)

Tags and Collection

Tags:

  • ransomware
  • incident-response
  • threat-intelligence
  • malware
  • cybersecurity
  • dfir
  • ayinedjimi-consultants

Collection: Ransomware Security - Complete ransomware resources collection

License

CC-BY-4.0 (Creative Commons Attribution 4.0)

Free to use with attribution to AYI-NEDJIMI Consultants

Changelog

v1.0 (2025-02-13)

  • 40+ ransomware group profiles
  • 20 incident response playbooks
  • 50 French Q&A, 50 English Q&A
  • JSON/Parquet support
  • HuggingFace Hub integration

Contact & Support

Contributions & Feedback

Contributions welcome! Please:

  1. Fork repository
  2. Create feature branch
  3. Add/modify data
  4. Validate JSON syntax
  5. Submit pull request with description

Last Updated: 2025-02-13 Version: 1.0 Maintained by: AYI-NEDJIMI Consultants

Author

Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert

Related Articles

Free Cybersecurity Resources

Part of the Collection

This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.

Downloads last month
32

Collections including AYI-NEDJIMI/ransomware-playbooks-en