The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 4 new columns ({'event_type', 'target_asset_id', 'responder_id', 'related_campaign_id'}) and 20 missing columns ({'lateral_hop_count', 'attacker_capability_tier', 'alert_severity', 'process_injection_flag', 'source_ip_class', 'c2_beacon_interval_s', 'tactic_category', 'technique_id', 'kill_chain_phase', 'connection_duration_s', 'auth_failure_count', 'edr_blocked_flag', 'detection_outcome', 'defender_maturity_level', 'technique_name', 'dest_port', 'protocol', 'siem_rule_triggered', 'bytes_transferred', 'target_asset_type'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb002-sample/campaign_events.csv (at revision 230d71ec344f2a35cb347f1a05607b5e19aee971), [/tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
campaign_id: string
attacker_id: string
event_type: string
timestep: int64
target_segment_id: string
target_asset_id: string
responder_id: string
related_campaign_id: string
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1264
to
{'campaign_id': Value('string'), 'attacker_id': Value('string'), 'timestep': Value('int64'), 'kill_chain_phase': Value('string'), 'technique_id': Value('string'), 'technique_name': Value('string'), 'tactic_category': Value('string'), 'target_segment_id': Value('string'), 'target_asset_type': Value('string'), 'source_ip_class': Value('string'), 'dest_port': Value('int64'), 'protocol': Value('string'), 'bytes_transferred': Value('float64'), 'connection_duration_s': Value('float64'), 'auth_failure_count': Value('int64'), 'process_injection_flag': Value('int64'), 'lateral_hop_count': Value('int64'), 'c2_beacon_interval_s': Value('float64'), 'detection_outcome': Value('string'), 'alert_severity': Value('string'), 'siem_rule_triggered': Value('int64'), 'edr_blocked_flag': Value('int64'), 'attacker_capability_tier': Value('string'), 'defender_maturity_level': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 4 new columns ({'event_type', 'target_asset_id', 'responder_id', 'related_campaign_id'}) and 20 missing columns ({'lateral_hop_count', 'attacker_capability_tier', 'alert_severity', 'process_injection_flag', 'source_ip_class', 'c2_beacon_interval_s', 'tactic_category', 'technique_id', 'kill_chain_phase', 'connection_duration_s', 'auth_failure_count', 'edr_blocked_flag', 'detection_outcome', 'defender_maturity_level', 'technique_name', 'dest_port', 'protocol', 'siem_rule_triggered', 'bytes_transferred', 'target_asset_type'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb002-sample/campaign_events.csv (at revision 230d71ec344f2a35cb347f1a05607b5e19aee971), [/tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
campaign_id string | attacker_id string | timestep int64 | kill_chain_phase string | technique_id string | technique_name string | tactic_category string | target_segment_id string | target_asset_type string | source_ip_class string | dest_port int64 | protocol string | bytes_transferred float64 | connection_duration_s float64 | auth_failure_count int64 | process_injection_flag int64 | lateral_hop_count int64 | c2_beacon_interval_s float64 | detection_outcome string | alert_severity string | siem_rule_triggered int64 | edr_blocked_flag int64 | attacker_capability_tier string | defender_maturity_level string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CAMP-000000 | ATK-0000 | 0 | dwell_idle | T0000 | Dwell | null | SEG-0006 | domain_controller | internal_lan | 143 | udp | 533.95 | 15.127 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 1 | reconnaissance | T1591 | Gather Victim Org Information | Reconnaissance | SEG-0006 | server | internal_lan | 53 | ftp | 4,278.12 | 7.042 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 2 | reconnaissance | T1596 | Search Open Technical Databases | Reconnaissance | SEG-0006 | ehr_system | internal_lan | 53 | udp | 2,166.51 | 0.834 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 3 | initial_access | T1566 | Phishing | Initial Access | SEG-0006 | database_server | vpn_tunnel | 25 | dns | 29,130.64 | 4.768 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 4 | initial_access | T1195 | Supply Chain Compromise | Initial Access | SEG-0006 | domain_controller | vpn_tunnel | 25 | udp | 36,093.32 | 1.62 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 5 | dwell_idle | T0000 | Dwell | null | SEG-0006 | domain_controller | external_internet | 23 | ftp | 1,230,252.08 | 3.54 | 3 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 6 | initial_access | T1091 | Replication Through Removable Media | Initial Access | SEG-0006 | iot_device | external_internet | 9,001 | udp | 41,985.61 | 5.68 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 7 | initial_access | T1091 | Replication Through Removable Media | Initial Access | SEG-0006 | backup_system | cloud_egress | 135 | icmp | 692,194.37 | 2.199 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 8 | dwell_idle | T0000 | Dwell | null | SEG-0006 | router | cloud_egress | 53 | https | 4,686.3 | 8.401 | 4 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 9 | dwell_idle | T0000 | Dwell | null | SEG-0006 | email_server | external_internet | 110 | icmp | 43,275.7 | 2.331 | 4 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 10 | initial_access | T1078 | Valid Accounts | Initial Access | SEG-0006 | domain_controller | vpn_tunnel | 8,080 | ftp | 5,388.04 | 20.758 | 7 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 11 | initial_access | T1091 | Replication Through Removable Media | Initial Access | SEG-0006 | domain_controller | tor_exit | 110 | https | 1,035.75 | 5.842 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 12 | initial_access | T1091 | Replication Through Removable Media | Initial Access | SEG-0006 | vpn_gateway | tor_exit | 80 | rdp | 808.25 | 4.876 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 13 | initial_access | T1190 | Exploit Public-Facing Application | Initial Access | SEG-0006 | container | internal_lan | 110 | udp | 1,369.85 | 3.265 | 6 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 14 | initial_access | T1195 | Supply Chain Compromise | Initial Access | SEG-0006 | server | tor_exit | 443 | rdp | 23,682.08 | 8.387 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 15 | dwell_idle | T0000 | Dwell | null | SEG-0006 | iot_device | internal_lan | 8,443 | ftp | 32,493.51 | 6.638 | 1 | 1 | 0 | 0 | blind_spot | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 16 | execution | T1047 | Windows Management Instrumentation | Execution | SEG-0006 | router | tor_exit | 22 | http | 3,931.75 | 0.708 | 0 | 0 | 0 | 0 | suppressed_alert | low | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 17 | execution | T1053 | Scheduled Task/Job | Execution | SEG-0006 | ehr_system | internal_lan | 80 | icmp | 1,708.67 | 9.763 | 0 | 1 | 0 | 0 | ir_escalated | critical | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 18 | execution | T1106 | Native API | Execution | SEG-0006 | ehr_system | internal_lan | 8,080 | tcp | 18,741.03 | 6.579 | 1 | 1 | 0 | 0 | blind_spot | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 19 | persistence | T1505 | Server Software Component | Persistence | SEG-0006 | workstation | tor_exit | 143 | ftp | 223.24 | 1.764 | 1 | 0 | 0 | 0 | high_confidence_alert | high | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 20 | persistence | T1078 | Valid Accounts | Persistence | SEG-0006 | ehr_system | tor_exit | 110 | smb | 2,742.65 | 0.561 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 21 | persistence | T1574 | Hijack Execution Flow | Persistence | SEG-0006 | ehr_system | cloud_egress | 23 | https | 1,190.96 | 9.234 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 22 | persistence | T1136 | Create Account | Persistence | SEG-0006 | server | external_internet | 443 | rdp | 16,163.4 | 18.607 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 23 | dwell_idle | T0000 | Dwell | null | SEG-0006 | router | internal_lan | 22 | icmp | 157,381.93 | 0.741 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 24 | persistence | T1505 | Server Software Component | Persistence | SEG-0006 | backup_system | internal_lan | 23 | ssh | 137,309.19 | 14.261 | 0 | 0 | 0 | 0 | marginal_alert | medium | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 25 | persistence | T1547 | Boot or Logon Autostart Execution | Persistence | SEG-0006 | vpn_gateway | cloud_egress | 53 | rdp | 153.62 | 9.845 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 26 | dwell_idle | T0000 | Dwell | null | SEG-0006 | vpn_gateway | cloud_egress | 135 | dns | 7,968.08 | 1.523 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 27 | persistence | T1543 | Create or Modify System Process | Persistence | SEG-0006 | web_server | vpn_tunnel | 445 | icmp | 2,827.15 | 2.084 | 1 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 28 | persistence | T1078 | Valid Accounts | Persistence | SEG-0006 | email_server | external_internet | 443 | http | 5,683.47 | 5.14 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 29 | dwell_idle | T0000 | Dwell | null | SEG-0006 | router | vpn_tunnel | 9,001 | http | 30,223.68 | 0.915 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 30 | persistence | T1078 | Valid Accounts | Persistence | SEG-0006 | firewall | vpn_tunnel | 110 | icmp | 83,294.81 | 9.464 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 31 | persistence | T1136 | Create Account | Persistence | SEG-0006 | web_server | vpn_tunnel | 80 | ftp | 10,386.75 | 1.25 | 0 | 0 | 0 | 0 | suppressed_alert | low | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 32 | persistence | T1136 | Create Account | Persistence | SEG-0006 | firewall | cloud_egress | 3,389 | http | 118,215.91 | 49.564 | 0 | 0 | 0 | 0 | high_confidence_alert | high | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 33 | privilege_escalation | T1611 | Escape to Host | Privilege Escalation | SEG-0006 | vpn_gateway | cloud_egress | 445 | ftp | 9,019.1 | 14.925 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 34 | privilege_escalation | T1055 | Process Injection | Privilege Escalation | SEG-0006 | database_server | cloud_egress | 25 | https | 39,741.74 | 9.251 | 5 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 35 | privilege_escalation | T1055 | Process Injection | Privilege Escalation | SEG-0006 | cloud_vm | vpn_tunnel | 22 | ftp | 7,006.9 | 1.674 | 5 | 1 | 0 | 0 | blind_spot | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 36 | dwell_idle | T0000 | Dwell | null | SEG-0006 | router | vpn_tunnel | 4,444 | tcp | 12,727.08 | 50.355 | 3 | 1 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 37 | privilege_escalation | T1484 | Domain Policy Modification | Privilege Escalation | SEG-0006 | email_server | internal_lan | 135 | rdp | 4,746.51 | 24.607 | 2 | 1 | 0 | 0 | high_confidence_alert | high | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 38 | dwell_idle | T0000 | Dwell | null | SEG-0006 | firewall | tor_exit | 80 | smb | 784,335.39 | 4.395 | 5 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 39 | lateral_movement | T1550 | Use Alternate Authentication Material | Lateral Movement | SEG-0006 | iot_device | vpn_tunnel | 443 | rdp | 17,957.11 | 66.891 | 2 | 0 | 0 | 0 | suppressed_alert | low | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 40 | lateral_movement | T1210 | Exploitation of Remote Services | Lateral Movement | SEG-0006 | ehr_system | external_internet | 139 | https | 45,491.81 | 38.217 | 1 | 0 | 1 | 0 | high_confidence_alert | high | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 41 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | email_server | vpn_tunnel | 139 | dns | 157,931.25 | 54.402 | 3 | 0 | 1 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 42 | lateral_movement | T1570 | Lateral Tool Transfer | Lateral Movement | SEG-0006 | vpn_gateway | cloud_egress | 5,985 | https | 4,901.96 | 4.244 | 7 | 0 | 0 | 0 | high_confidence_alert | high | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 43 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | email_server | tor_exit | 8,443 | udp | 1,663.74 | 3.233 | 2 | 0 | 1 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 44 | lateral_movement | T1210 | Exploitation of Remote Services | Lateral Movement | SEG-0006 | router | internal_lan | 22 | icmp | 317.28 | 6.157 | 1 | 0 | 1 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 45 | lateral_movement | T1534 | Internal Spearphishing | Lateral Movement | SEG-0006 | ehr_system | cloud_egress | 139 | icmp | 39,089.74 | 2.291 | 0 | 0 | 1 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 46 | lateral_movement | T1550 | Use Alternate Authentication Material | Lateral Movement | SEG-0006 | database_server | cloud_egress | 5,985 | smb | 2,982.49 | 6.887 | 2 | 0 | 1 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 47 | lateral_movement | T1534 | Internal Spearphishing | Lateral Movement | SEG-0006 | router | internal_lan | 9,001 | icmp | 4,919.07 | 92.348 | 3 | 0 | 1 | 0 | blind_spot | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 48 | lateral_movement | T1550 | Use Alternate Authentication Material | Lateral Movement | SEG-0006 | ehr_system | vpn_tunnel | 25 | http | 554,850.32 | 8.892 | 2 | 0 | 1 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 49 | lateral_movement | T1550 | Use Alternate Authentication Material | Lateral Movement | SEG-0006 | web_server | tor_exit | 445 | https | 5,396.99 | 32.748 | 1 | 1 | 1 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 50 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | scada_plc | vpn_tunnel | 8,443 | smb | 32,220.34 | 9.531 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 51 | lateral_movement | T1563 | Remote Service Session Hijacking | Lateral Movement | SEG-0006 | container | internal_lan | 8,080 | ftp | 103,091.85 | 6.454 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 52 | dwell_idle | T0000 | Dwell | null | SEG-0006 | scada_plc | internal_lan | 80 | dns | 576,286.72 | 10.008 | 2 | 1 | 0 | 0 | high_confidence_alert | critical | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 53 | lateral_movement | T1021 | Remote Services | Lateral Movement | SEG-0006 | domain_controller | vpn_tunnel | 9,001 | https | 310,343.04 | 24.446 | 4 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 54 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | container | tor_exit | 8,443 | tcp | 7,495.53 | 14.647 | 1 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 55 | lateral_movement | T1210 | Exploitation of Remote Services | Lateral Movement | SEG-0006 | firewall | vpn_tunnel | 445 | ftp | 849,621.63 | 26.879 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 56 | lateral_movement | T1570 | Lateral Tool Transfer | Lateral Movement | SEG-0006 | container | tor_exit | 4,444 | icmp | 909,457.23 | 4.651 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 57 | lateral_movement | T1570 | Lateral Tool Transfer | Lateral Movement | SEG-0006 | iot_device | external_internet | 110 | https | 66,837.19 | 5.153 | 2 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 58 | lateral_movement | T1550 | Use Alternate Authentication Material | Lateral Movement | SEG-0006 | workstation | external_internet | 25 | ftp | 45,661.19 | 25.328 | 5 | 0 | 0 | 0 | blind_spot | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 59 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | vpn_gateway | internal_lan | 110 | smb | 14,966.85 | 3.523 | 1 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 60 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | ehr_system | vpn_tunnel | 139 | dns | 64 | 20.991 | 2 | 1 | 0 | 0 | ir_escalated | critical | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 61 | lateral_movement | T1563 | Remote Service Session Hijacking | Lateral Movement | SEG-0006 | web_server | cloud_egress | 80 | udp | 56,802.09 | 0.966 | 2 | 0 | 0 | 0 | high_confidence_alert | critical | 1 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 62 | lateral_movement | T1080 | Taint Shared Content | Lateral Movement | SEG-0006 | email_server | tor_exit | 8,443 | rdp | 2,027.07 | 48.192 | 1 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 63 | lateral_movement | T1021 | Remote Services | Lateral Movement | SEG-0006 | firewall | vpn_tunnel | 9,001 | rdp | 35,889.99 | 18.421 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000000 | ATK-0000 | 64 | collection | T1025 | Data from Removable Media | Collection | SEG-0006 | server | cloud_egress | 25 | https | 756.47 | 8.839 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 65 | collection | T1025 | Data from Removable Media | Collection | SEG-0006 | web_server | internal_lan | 8,443 | ftp | 5,279.36 | 5.969 | 1 | 0 | 0 | 0 | suppressed_alert | low | 0 | 0 | apt | advanced |
CAMP-000000 | ATK-0000 | 66 | collection | T1039 | Data from Network Shared Drive | Collection | SEG-0006 | web_server | internal_lan | 80 | rdp | 1,677.52 | 3.729 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | advanced |
CAMP-000001 | ATK-0000 | 0 | reconnaissance | T1595 | Active Scanning | Reconnaissance | SEG-0005 | backup_system | internal_lan | 445 | dns | 34,796.73 | 13.593 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 1 | reconnaissance | T1596 | Search Open Technical Databases | Reconnaissance | SEG-0005 | backup_system | external_internet | 8,080 | tcp | 19,135.61 | 7.331 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 2 | dwell_idle | T0000 | Dwell | null | SEG-0005 | scada_plc | internal_lan | 53 | ftp | 1,919.63 | 11.268 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 3 | reconnaissance | T1591 | Gather Victim Org Information | Reconnaissance | SEG-0005 | domain_controller | external_internet | 8,443 | http | 11,141.99 | 24.439 | 1 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 4 | reconnaissance | T1591 | Gather Victim Org Information | Reconnaissance | SEG-0005 | server | vpn_tunnel | 4,444 | ssh | 671.63 | 2.124 | 0 | 0 | 0 | 0 | suppressed_alert | low | 0 | 0 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 5 | reconnaissance | T1598 | Phishing for Information | Reconnaissance | SEG-0005 | scada_plc | cloud_egress | 443 | rdp | 4,966.82 | 1.265 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 6 | reconnaissance | T1596 | Search Open Technical Databases | Reconnaissance | SEG-0005 | web_server | vpn_tunnel | 4,444 | udp | 249.92 | 11.483 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 7 | reconnaissance | T1589 | Gather Victim Identity Information | Reconnaissance | SEG-0005 | workstation | cloud_egress | 4,444 | icmp | 54,696.17 | 6.496 | 0 | 0 | 0 | 0 | ir_escalated | critical | 1 | 0 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 8 | reconnaissance | T1595 | Active Scanning | Reconnaissance | SEG-0005 | firewall | vpn_tunnel | 3,389 | dns | 6,386.2 | 0.954 | 1 | 0 | 0 | 0 | marginal_alert | medium | 1 | 0 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 9 | reconnaissance | T1591 | Gather Victim Org Information | Reconnaissance | SEG-0005 | email_server | tor_exit | 23 | dns | 103,009.4 | 2.261 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 10 | reconnaissance | T1592 | Gather Victim Host Information | Reconnaissance | SEG-0005 | server | external_internet | 8,443 | rdp | 569,815.41 | 42.088 | 0 | 0 | 0 | 0 | high_confidence_alert | high | 1 | 0 | apt | zero_trust |
CAMP-000001 | ATK-0000 | 11 | initial_access | T1200 | Hardware Additions | Initial Access | SEG-0005 | iot_device | cloud_egress | 445 | http | 4,709.22 | 42.857 | 6 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | zero_trust |
CAMP-000002 | ATK-0000 | 0 | reconnaissance | T1598 | Phishing for Information | Reconnaissance | SEG-0010 | firewall | tor_exit | 110 | dns | 62,644.38 | 11.761 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 1 | reconnaissance | T1596 | Search Open Technical Databases | Reconnaissance | SEG-0010 | iot_device | external_internet | 143 | ftp | 1,898.96 | 10.368 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 2 | dwell_idle | T0000 | Dwell | null | SEG-0010 | scada_plc | tor_exit | 3,389 | rdp | 13,941.33 | 5.709 | 2 | 0 | 0 | 0 | ir_escalated | critical | 1 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 3 | initial_access | T1566 | Phishing | Initial Access | SEG-0010 | server | internal_lan | 23 | http | 14,283.44 | 4.121 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 4 | initial_access | T1190 | Exploit Public-Facing Application | Initial Access | SEG-0010 | container | vpn_tunnel | 445 | ftp | 67,981.43 | 3.488 | 6 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 5 | initial_access | T1190 | Exploit Public-Facing Application | Initial Access | SEG-0010 | domain_controller | vpn_tunnel | 139 | icmp | 3,444.66 | 5.226 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 6 | execution | T1053 | Scheduled Task/Job | Execution | SEG-0010 | firewall | external_internet | 25 | dns | 545.13 | 21.155 | 0 | 1 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 7 | execution | T1204 | User Execution | Execution | SEG-0010 | container | cloud_egress | 5,985 | https | 2,504.09 | 19.008 | 1 | 1 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 8 | execution | T1072 | Software Deployment Tools | Execution | SEG-0010 | vpn_gateway | vpn_tunnel | 445 | smb | 6,507.73 | 5.989 | 1 | 1 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 9 | execution | T1204 | User Execution | Execution | SEG-0010 | iot_device | internal_lan | 8,080 | rdp | 204,549.63 | 4.212 | 2 | 1 | 0 | 0 | high_confidence_alert | high | 1 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 10 | execution | T1203 | Exploitation for Client Execution | Execution | SEG-0010 | web_server | external_internet | 8,080 | smb | 7,722.63 | 1.327 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 11 | dwell_idle | T0000 | Dwell | null | SEG-0010 | scada_plc | vpn_tunnel | 9,001 | ssh | 2,900.98 | 1.695 | 0 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 12 | persistence | T1547 | Boot or Logon Autostart Execution | Persistence | SEG-0010 | container | tor_exit | 3,389 | udp | 10,222.33 | 10.729 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 13 | dwell_idle | T0000 | Dwell | null | SEG-0010 | database_server | vpn_tunnel | 5,985 | http | 310,634.05 | 21.523 | 0 | 0 | 0 | 0 | blind_spot | informational | 0 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 14 | persistence | T1547 | Boot or Logon Autostart Execution | Persistence | SEG-0010 | router | vpn_tunnel | 22 | udp | 191,369.79 | 1.099 | 0 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 15 | privilege_escalation | T1134 | Access Token Manipulation | Privilege Escalation | SEG-0010 | vpn_gateway | tor_exit | 5,985 | udp | 216,698.05 | 17.171 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 16 | dwell_idle | T0000 | Dwell | null | SEG-0010 | database_server | cloud_egress | 4,444 | udp | 10,096.45 | 12.063 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 17 | dwell_idle | T0000 | Dwell | null | SEG-0010 | database_server | external_internet | 53 | ssh | 1,575.23 | 29.391 | 3 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 18 | privilege_escalation | T1484 | Domain Policy Modification | Privilege Escalation | SEG-0010 | server | vpn_tunnel | 8,443 | smb | 7,538.46 | 14.211 | 4 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CAMP-000002 | ATK-0000 | 19 | privilege_escalation | T1546 | Event Triggered Execution | Privilege Escalation | SEG-0010 | email_server | cloud_egress | 53 | dns | 8,848.26 | 1.896 | 4 | 0 | 0 | 0 | evasion_success | informational | 0 | 0 | apt | baseline |
CAMP-000002 | ATK-0000 | 20 | privilege_escalation | T1546 | Event Triggered Execution | Privilege Escalation | SEG-0010 | backup_system | internal_lan | 3,389 | icmp | 1,585.58 | 2.429 | 2 | 0 | 0 | 0 | edr_blocked | critical | 0 | 1 | apt | baseline |
CYB002 — Synthetic Cyber Attack Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB002-SAMPLE · Version 1.0.0
This is a free preview of the full CYB002 — Synthetic Cyber Attack Dataset product. It contains roughly 1 / 60th of the full dataset at identical schema, attacker-tier distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.
🤖 Trained baseline available: xpertsystems/cyb002-baseline-classifier — XGBoost + PyTorch MLP for 10-class MITRE ATT&CK kill-chain phase prediction, group-aware split by campaign, ablation evidence, honest limitations in the model card.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
network_topology.csv |
~651 | ~3,200 | Network segments and asset inventory |
campaign_summary.csv |
~100 | ~6,000 | Per-campaign outcome aggregates |
campaign_events.csv |
~739 | ~65,000 | Discrete campaign event log |
attack_events.csv |
~4,353 | ~380,000 | Timestep-level kill-chain events |
Dataset Summary
CYB002 simulates end-to-end cyber attack lifecycles as a 9-phase MITRE ATT&CK kill-chain state machine across enterprise, cloud, endpoint, and OT/ICS environments, with:
- 9 ATT&CK phases: reconnaissance, resource_development, initial_access, execution, persistence, privilege_escalation, defense_evasion, lateral_movement, exfiltration
- 4 attacker capability tiers: opportunistic, organized_crime, apt, nation_state — with per-tier dwell time, lateral hop rate, and stealth weight distributions
- 5 defender maturity levels: ad_hoc, defined, managed, quantitatively_ managed, optimizing
- MITRE ATT&CK technique catalogue with representative subset of Enterprise v14 techniques mapped to each phase
- EDR coverage modelling with configurable effectiveness
- Ransomware deployment, supply chain compromise, and exfiltration outcome paths
Trained Baseline Available
A working baseline classifier trained on this sample is published at xpertsystems/cyb002-baseline-classifier.
| Component | Detail |
|---|---|
| Task | 10-class MITRE ATT&CK kill-chain phase classification |
| Models | XGBoost (model_xgb.json) + PyTorch MLP (model_mlp.safetensors) |
| Features | 90 (after one-hot encoding); pipeline included as feature_engineering.py |
| Split | Group-aware by campaign_id — train/val/test campaigns disjoint |
| Demo | inference_example.ipynb — end-to-end copy-paste |
| Headline metrics | XGBoost macro ROC-AUC 0.86; accuracy 47% (vs 19% always-majority baseline) |
The model card documents the three columns excluded for label leakage
(technique_id, technique_name, tactic_category), an ablation
showing timestep carries most of the phase signal, and six explicit
limitations including the gap between synthetic and real attack
telemetry. Late-stage phases (collection / exfiltration / impact) are
genuinely harder for a flat-tabular event-level model — the baseline
exposes this honestly.
Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics drawn from authoritative threat intelligence sources (Mandiant M-Trends, IBM CODB, Verizon DBIR, CrowdStrike GTR, MITRE ATT&CK Evaluations, SANS, ENISA). The sample preserves the same calibration. Observed values on this sample:
| Test | Target | Observed | Verdict |
|---|---|---|---|
| dwell_time_hours_apt | 21.0000 | 21.1595 | ✓ PASS |
| detection_rate_advanced | 0.8600 | 0.8600 | ✓ PASS |
| exfiltration_success_rate | 0.3100 | 0.3000 | ✓ PASS |
| lateral_hop_rate_apt | 0.0720 | 0.0552 | ✓ PASS |
| suppressed_alert_rate | 0.0770 | 0.0719 | ✓ PASS |
| mttd_hours_advanced | 4.2000 | 3.3541 | ✓ PASS |
| mttr_hours_advanced | 18.0000 | 19.7415 | ✓ PASS |
| ransomware_deployment_rate | 0.2400 | 0.2100 | ✓ PASS |
| campaign_success_rate | 0.3400 | 0.4300 | ~ MARGINAL |
| privilege_escalation_rate | 0.6200 | 0.6600 | ✓ PASS |
| edr_block_rate | 0.4300 | 0.3680 | ~ MARGINAL |
| supply_chain_compromise_rate | 0.0850 | 0.0800 | ✓ PASS |
Note: some benchmarks (e.g. APT dwell time, MTTR) require larger sample sizes to converge. The full product passes all 12 benchmarks at Grade A-.
Schema Highlights
attack_events.csv (primary file, timestep-level)
| Column | Type | Description |
|---|---|---|
| campaign_id | string | Parent campaign FK |
| attacker_id | string | Attacker FK |
| timestep | int | Step in kill-chain simulation |
| phase | string | 1 of 9 ATT&CK phases |
| technique_id | string | MITRE ATT&CK technique ID (e.g. T1059.001) |
| technique_name | string | Human-readable technique name |
| tactic | string | ATT&CK tactic category |
| segment_id | string | FK to network_topology.csv |
| asset_id | string | Target asset within segment |
| attacker_tier | string | opportunistic / organized_crime / apt / nation_state |
| defender_maturity | string | ad_hoc / defined / managed / quant / optimizing |
| stealth_score | float | Action stealth weight (0–1) |
| detected | int | Whether action was detected (0/1) |
| blocked | int | Whether action was blocked (0/1) |
| edr_deployed | int | EDR present on target asset |
| alert_severity | string | INFO / LOW / MEDIUM / HIGH / CRITICAL |
| dwell_hours_so_far | float | Cumulative dwell time at this step |
campaign_summary.csv (per-campaign outcome)
| Column | Type | Description |
|---|---|---|
| campaign_id, attacker_id | string | Identifiers |
| attacker_tier, defender_maturity | string | Categorical |
| campaign_outcome | string | success / detected / blocked / aborted |
| total_dwell_hours | float | End-to-end attacker dwell time |
| mttd_hours, mttr_hours | float | Mean time to detect / respond |
| exfiltrated_bytes | int | Bytes exfiltrated (0 if none) |
| ransomware_deployed | int | Boolean |
| lateral_hops | int | Count of lateral movement actions |
| privilege_escalated | int | Boolean |
| supply_chain_used | int | Boolean |
See campaign_events.csv and network_topology.csv for the discrete event
log and asset inventory schemas respectively.
Suggested Use Cases
- Training kill-chain phase classifiers (predict next ATT&CK phase) — worked example available
- Benchmarking APT detection algorithms (long dwell, low stealth_score)
- Campaign outcome prediction (success / detected / blocked / aborted)
- MTTD / MTTR forecasting under varying defender maturity
- Ransomware risk modelling across attacker tiers
- Red-team simulation training data for purple-team exercises
- SOC alert triage benchmarking with realistic severity distributions
Loading the Data
import pandas as pd
attacks = pd.read_csv("attack_events.csv")
campaigns = pd.read_csv("campaign_summary.csv")
events = pd.read_csv("campaign_events.csv")
topology = pd.read_csv("network_topology.csv")
# Join to get the full attack context
enriched = attacks.merge(campaigns, on=["campaign_id", "attacker_id"], how="left")
enriched = enriched.merge(topology, on="segment_id", how="left")
# Binary detection target
y = attacks["detected"].astype(int)
# Campaign-level outcome target
y_outcome = campaigns["campaign_outcome"]
For a worked end-to-end example with the 10-class kill-chain phase target, group-aware splitting, and feature engineering, see the inference notebook in the baseline classifier repo.
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB002 dataset includes ~454,000 rows across all four files, with calibrated benchmark validation against 12 metrics drawn from authoritative threat intelligence sources.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb002_sample_2026,
title = {CYB002: Synthetic Cyber Attack Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb002-sample}
}
Generation Details
- Generator version : 2.0.0
- Random seed : 42
- Generated : 2026-05-16 13:39:22 UTC
- Kill-chain model : 9-phase MITRE ATT&CK state machine
- Overall benchmark : 95.3 / 100 (grade A)
- Downloads last month
- 28