nemesis-cyber-pack / SCHEMA.md
solsticestudioai's picture
Add schema doc
35fef0a verified

Nemesis Cyber Threat Simulation Pack — Schema

One row = one simulated adversarial attack episode, end-to-end. All records share the same eight top-level fields.

Schema version: 1.0.0-nemesis-cyber-sample

Top-level fields

schema_version — string

Schema identifier. Constant within a sample release. Used to detect pack version drift.

event — struct

Identifier fields and the overall decision outcome.

Field Type Notes
id string Stable episode identifier, e.g., NEMESIS-1541935.
timestamp string (ISO-8601) Episode start time.
trace_id string (UUID) Cross-links telemetry steps within the episode.
weighted_score double Aggregate risk score for this episode.
decision_outcome string One of: detected_by_soc, blocked_by_edr, stealth_maintained, exfiltration_complete, impact_achieved.

risk_context — struct

Environmental context and the triggering signal that initiated the adversarial episode.

Field Type Notes
trigger string Short-code for the initial trigger (e.g., phishing_attachment_opened, k8s_pod_escape, iam_policy_modification, unusual_ingress_traffic).
protocol string Protection domain / environment: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway.
chain string Target environment identifier (e.g., us-east-1, windows-server-2022, prod-cluster-01, ubuntu-22.04).
impacted_asset string Named asset under attack (e.g., ntds.dit, kube-apiserver, IAM role name, app endpoint).
anomaly_signature string Human-readable summary of the triggering anomaly.

agent_reasoning — struct

Planner-side metadata for the adversarial agent that selected and executed this episode.

Field Type Notes
engine string Planner engine label. In this sample: nemesis_planner.
winning_strategy string Selected top-level strategy (e.g., Stealth_Escalation).
confidence_score double Planner confidence in the chosen strategy at selection time.
mcts_branches int64 Number of MCTS branches considered before the selection.

correlated_telemetry — list

Ordered sequence of steps taken during the episode. One struct per step.

Step struct:

Field Type Notes
action string ATT&CK-style action code (e.g., USER_DISCOVERY, LSASS_MEMORY_DUMP, CRED_ACCESS_PASS_THE_HASH, LATERAL_SMB_EXEC, IMPACT_DATA_ENCRYPTED).
component string Which internal component emitted the step (NEMESIS_ORCHESTRATOR, NEMESIS_GHOST, NEMESIS_EXPLOIT).
timestamp string (ISO-8601) Step timestamp.
telemetry.evasion_score double 0–1. Higher = more evasive.
telemetry.latency_ms int64 Step execution latency in milliseconds.
telemetry.noise_level_db int64 Relative noise generated by the step.
telemetry.node_provider string Observing detection surface (e.g., Azure_Sentinel, CrowdStrike, CloudTrail).

execution_summary — struct

Roll-up metrics for the full episode.

Field Type Notes
strategy string Final strategy label executed (matches or post-adjusts the agent_reasoning.winning_strategy).
success_rate double 0–1 score of action-chain completion against plan.
total_execution_ms int64 End-to-end episode duration.
noise_penalty double Penalty contribution from cumulative step noise.

genetic_optimizer_feedback — struct

Outer-loop optimizer feedback used to tune future planner iterations.

Field Type Notes
fitness_score_update double Delta applied to the strategy's fitness score after this episode.
parameter_drift string Coarse drift descriptor (none, minor, major, …).

decision_outcome — string

Duplicated from event.decision_outcome for quick grouping and classification without struct unpacking.

Distribution of this sample

  • 10,000 rows, stratified 2,000 per outcome class across all five outcomes.
  • Balanced across four protocol environments: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway.
  • Triggers map 1:1 to protocols in this sample.
  • Planner engine label is constant (nemesis_planner) after sanitization of internal method identifiers.

Sanitization notes

  • Internal identifier prefixes (e.g., SIMA-V4-CYBER-*) have been normalized to NEMESIS-*.
  • Internal planner engine code names have been normalized to nemesis_planner.
  • No real hostnames, users, indicators of compromise, credentials, exploit code, or victim data are present.

Relationship to the full pack

The production pack contains 2.5M episodes with a richer protocol and trigger space, adversary persona variants, campaign-level chains spanning multiple episodes, per-step process tree fragments, and defender-side reasoning traces. See the pack card for commercial access.