nemesis-cyber-pack / README.md
solsticestudioai's picture
Point all canonical links at www.solsticestudio.ai/datasets
43c913a verified
metadata
license: cc-by-4.0
task_categories:
  - tabular-classification
  - text-classification
language:
  - en
tags:
  - synthetic
  - cybersecurity
  - threat-intelligence
  - red-team
  - blue-team
  - soc
  - siem
  - edr
  - mitre-attack
  - detection-engineering
  - security-analytics
  - adversarial-simulation
  - agentic-ai
pretty_name: Nemesis Cyber Threat Simulation Pack
size_categories:
  - 10K<n<100K
configs:
  - config_name: default
    data_files:
      - split: train
        path: nemesis_cyber_sample.parquet

Nemesis Cyber Threat Simulation Pack (Sample)

A synthetic adversarial-agent cyber operations dataset for detection-model training, SOC analyst triage research, and blue-team evaluation. Each row captures a complete simulated attack episode: triggering anomaly, environment context, adversarial planner reasoning, correlated telemetry trace, execution summary, and final decision outcome (detected / blocked / impact achieved / stealth maintained / exfiltration complete).

Built by SolsticeAI as a free sample of a larger commercial pack. 100% synthetic. No real incident, victim, or exploit data — and no working offensive code. TTP labels align with MITRE ATT&CK vocabulary so this sample can be used to train and benchmark defenders.

What is included

File Rows Format Purpose
nemesis_cyber_sample.parquet 10,000 Parquet Columnar, typed, best for analytics
nemesis_cyber_sample.jsonl 10,000 JSON Lines Streaming / LLM training friendly

Source pack: 2.5M-episode corpus
This sample: 10,000 episodes, stratified 2,000 per outcome class
Outcome classes: detected_by_soc, blocked_by_edr, stealth_maintained, exfiltration_complete, impact_achieved
Environments covered: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway

Record structure

Each record is one simulated attack episode with 8 top-level fields:

Field Type Contents
schema_version string Pack schema version (1.0.0-nemesis-cyber-sample)
event struct id, timestamp, trace_id, weighted_score, decision_outcome
risk_context struct trigger, protocol, chain, impacted_asset, anomaly_signature
agent_reasoning struct engine, winning_strategy, confidence_score, mcts_branches
correlated_telemetry list Ordered action chain with per-step telemetry (latency, noise, evasion score, node provider)
execution_summary struct strategy, success_rate, total_execution_ms, noise_penalty
genetic_optimizer_feedback struct fitness_score_update, parameter_drift
decision_outcome string Final label (duplicated from event.decision_outcome for convenience)

See SCHEMA.md for the full nested field breakdown.

Why this dataset is useful

Most public cybersecurity datasets are either raw packet captures, static CTI feeds, or narrow single-technique labeling sets. This pack is shaped around what detection-engineering and SOC-analytics teams actually need to train modern models:

  • Multi-step attack episodes rather than isolated alerts
  • Balanced outcome classes across detected, blocked, stealthy, and successful attempts
  • Adversarial reasoning trace (strategy + MCTS branch count + confidence) alongside the telemetry
  • Per-step evasion and noise signals to train detection models that weigh stealth vs noise trade-offs
  • Cross-environment coverage (cloud, identity, container, web)
  • Stable schema suitable for dashboard prototyping, triage simulators, and ML pipelines

Typical use cases

  • SOC triage and alert-prioritization model training
  • Detection engineering rule evaluation against balanced positive and negative cases
  • Adversarial-AI research on multi-step planner behavior
  • Tabletop and red-vs-blue simulator content
  • LLM fine-tuning on incident narratives and defender reasoning
  • Benchmarking anomaly-scoring and false-positive reduction pipelines
  • Dashboard and BI template development for security analytics

Quick start

import pandas as pd
import pyarrow.parquet as pq

df = pq.read_table("nemesis_cyber_sample.parquet").to_pandas()

# Outcome distribution (stratified balanced)
print(df["decision_outcome"].value_counts())

# Evasion pressure per environment
df["protocol"] = df["risk_context"].apply(lambda r: r.get("protocol"))
df["avg_evasion"] = df["correlated_telemetry"].apply(
    lambda steps: sum(s["telemetry"]["evasion_score"] for s in steps) / max(len(steps), 1)
)
print(df.groupby("protocol")["avg_evasion"].mean().round(3))

# Detection-rate by trigger type
df["trigger"] = df["risk_context"].apply(lambda r: r.get("trigger"))
detection_rate = (df["decision_outcome"].isin(["detected_by_soc", "blocked_by_edr"])
                  .groupby(df["trigger"]).mean().round(3))
print(detection_rate)

Streaming form:

import json

with open("nemesis_cyber_sample.jsonl") as f:
    for line in f:
        episode = json.loads(line)
        # one episode per line

Responsible use

This dataset is intended for defensive research: detection modeling, SOC tooling, and adversarial-agent studies. It contains synthesized attack metadata and MITRE-aligned TTP labels — it does not contain working offensive payloads, exploit code, shellcode, malware samples, credentials, private vulnerability details, or any real-world victim data. Please use it to improve defenses.

License

Released under CC BY 4.0. Use freely for research, detection-engineering, education, and commercial prototyping with attribution.

Get the full pack

This Hugging Face repo is a 10K-episode sample. The production pack scales to 2.5M+ episodes, additional outcome labels, richer per-step telemetry, attacker/defender variant splits, multi-environment campaign chains, parquet + JSONL + SIEM-import formats, and buyer-specific variants.

Self-serve (Stripe checkout):

Full pack + enterprise scope:

  • www.solsticestudio.ai/datasets — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants.

Procurement catalog:

Citation

@dataset{solstice_nemesis_cyber_pack_2026,
  title        = {Nemesis Cyber Threat Simulation Pack (Sample)},
  author       = {SolsticeAI},
  year         = {2026},
  publisher    = {Hugging Face},
  url          = {https://huggingface.co/datasets/solsticestudioai/nemesis-cyber-pack}
}