--- license: apache-2.0 datasets: - QCRI/AZERG-Dataset language: - en base_model: - mistralai/Mistral-7B-Instruct-v0.3 tags: - STIX standard - threat intelligence - MITRE ATT&CK --- # QCRI/AZERG-T2-Mistral This model is a fine-tuned version of `mistralai/Mistral-7B-Instruct-v0.3` specialized for `Task 2: STIX Entity Type Identification`. It has been trained on the [QCRI/AZERG-Dataset](https://huggingface.co/datasets/QCRI/AZERG-Dataset) to classify a given entity into one of the predefined STIX entity types (e.g., Malware, Tool, Threat-Actor). This is a specialist model designed for high performance on entity detection within the [AZERG framework](https://github.com/QCRI/azerg/). ## Intended Use Use this model to extract potential STIX entities from a given security text passage. ## Example Prompt: ``` Instruction: You are a helpful threat intelligence analyst. Your task is to assign a STIX entity type to the given Entity in the input. To help you, here is a list of the possible STIX entity types. [STIX ENTITY TYPES] Choose STIX ENTITY TYPE from list of possible answers: ["ATTACK_PATTERN", "CAMPAIGN", "COURSE_OF_ACTION", "IDENTITY", "INDICATOR", "INFRASTRUCTURE", "LOCATION", "MALWARE", "THREAT_ACTOR", "TOOL", "VULNERABILITY"]. Answer in the following format: ONE OF STIX ENTITY TYPES Input: - Entity: [TARGET ENTITY] - Text Passage: [INPUT TEXT] Response: ``` ## Citation If you use this model, please cite our paper: ``` @article{lekssays2025azerg, title={From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction}, author={Lekssays, Ahmed and Sencar, Husrev Taha and Yu, Ting}, journal={arXiv preprint arXiv:2507.16576}, year={2025} } ```