Datasets:
Nemesis Cyber Threat Simulation Pack — Schema
One row = one simulated adversarial attack episode, end-to-end. All records share the same eight top-level fields.
Schema version: 1.0.0-nemesis-cyber-sample
Top-level fields
schema_version — string
Schema identifier. Constant within a sample release. Used to detect pack version drift.
event — struct
Identifier fields and the overall decision outcome.
| Field | Type | Notes |
|---|---|---|
id |
string | Stable episode identifier, e.g., NEMESIS-1541935. |
timestamp |
string (ISO-8601) | Episode start time. |
trace_id |
string (UUID) | Cross-links telemetry steps within the episode. |
weighted_score |
double | Aggregate risk score for this episode. |
decision_outcome |
string | One of: detected_by_soc, blocked_by_edr, stealth_maintained, exfiltration_complete, impact_achieved. |
risk_context — struct
Environmental context and the triggering signal that initiated the adversarial episode.
| Field | Type | Notes |
|---|---|---|
trigger |
string | Short-code for the initial trigger (e.g., phishing_attachment_opened, k8s_pod_escape, iam_policy_modification, unusual_ingress_traffic). |
protocol |
string | Protection domain / environment: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway. |
chain |
string | Target environment identifier (e.g., us-east-1, windows-server-2022, prod-cluster-01, ubuntu-22.04). |
impacted_asset |
string | Named asset under attack (e.g., ntds.dit, kube-apiserver, IAM role name, app endpoint). |
anomaly_signature |
string | Human-readable summary of the triggering anomaly. |
agent_reasoning — struct
Planner-side metadata for the adversarial agent that selected and executed this episode.
| Field | Type | Notes |
|---|---|---|
engine |
string | Planner engine label. In this sample: nemesis_planner. |
winning_strategy |
string | Selected top-level strategy (e.g., Stealth_Escalation). |
confidence_score |
double | Planner confidence in the chosen strategy at selection time. |
mcts_branches |
int64 | Number of MCTS branches considered before the selection. |
correlated_telemetry — list
Ordered sequence of steps taken during the episode. One struct per step.
Step struct:
| Field | Type | Notes |
|---|---|---|
action |
string | ATT&CK-style action code (e.g., USER_DISCOVERY, LSASS_MEMORY_DUMP, CRED_ACCESS_PASS_THE_HASH, LATERAL_SMB_EXEC, IMPACT_DATA_ENCRYPTED). |
component |
string | Which internal component emitted the step (NEMESIS_ORCHESTRATOR, NEMESIS_GHOST, NEMESIS_EXPLOIT). |
timestamp |
string (ISO-8601) | Step timestamp. |
telemetry.evasion_score |
double | 0–1. Higher = more evasive. |
telemetry.latency_ms |
int64 | Step execution latency in milliseconds. |
telemetry.noise_level_db |
int64 | Relative noise generated by the step. |
telemetry.node_provider |
string | Observing detection surface (e.g., Azure_Sentinel, CrowdStrike, CloudTrail). |
execution_summary — struct
Roll-up metrics for the full episode.
| Field | Type | Notes |
|---|---|---|
strategy |
string | Final strategy label executed (matches or post-adjusts the agent_reasoning.winning_strategy). |
success_rate |
double | 0–1 score of action-chain completion against plan. |
total_execution_ms |
int64 | End-to-end episode duration. |
noise_penalty |
double | Penalty contribution from cumulative step noise. |
genetic_optimizer_feedback — struct
Outer-loop optimizer feedback used to tune future planner iterations.
| Field | Type | Notes |
|---|---|---|
fitness_score_update |
double | Delta applied to the strategy's fitness score after this episode. |
parameter_drift |
string | Coarse drift descriptor (none, minor, major, …). |
decision_outcome — string
Duplicated from event.decision_outcome for quick grouping and classification without struct unpacking.
Distribution of this sample
- 10,000 rows, stratified 2,000 per outcome class across all five outcomes.
- Balanced across four
protocolenvironments: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway. - Triggers map 1:1 to protocols in this sample.
- Planner engine label is constant (
nemesis_planner) after sanitization of internal method identifiers.
Sanitization notes
- Internal identifier prefixes (e.g.,
SIMA-V4-CYBER-*) have been normalized toNEMESIS-*. - Internal planner engine code names have been normalized to
nemesis_planner. - No real hostnames, users, indicators of compromise, credentials, exploit code, or victim data are present.
Relationship to the full pack
The production pack contains 2.5M episodes with a richer protocol and trigger space, adversary persona variants, campaign-level chains spanning multiple episodes, per-step process tree fragments, and defender-side reasoning traces. See the pack card for commercial access.