Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 4 new columns ({'event_type', 'target_asset_id', 'responder_id', 'related_campaign_id'}) and 20 missing columns ({'lateral_hop_count', 'attacker_capability_tier', 'alert_severity', 'process_injection_flag', 'source_ip_class', 'c2_beacon_interval_s', 'tactic_category', 'technique_id', 'kill_chain_phase', 'connection_duration_s', 'auth_failure_count', 'edr_blocked_flag', 'detection_outcome', 'defender_maturity_level', 'technique_name', 'dest_port', 'protocol', 'siem_rule_triggered', 'bytes_transferred', 'target_asset_type'}).

This happened while the csv dataset builder was generating data using

hf://datasets/xpertsystems/cyb002-sample/campaign_events.csv (at revision 230d71ec344f2a35cb347f1a05607b5e19aee971), [/tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv)]

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
                  writer.write_table(table)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
                  self._write_table(pa_table, writer_batch_size=writer_batch_size)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
                  pa_table = table_cast(pa_table, self._schema)
                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
                  return cast_table_to_schema(table, schema)
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              campaign_id: string
              attacker_id: string
              event_type: string
              timestep: int64
              target_segment_id: string
              target_asset_id: string
              responder_id: string
              related_campaign_id: string
              -- schema metadata --
              pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1264
              to
              {'campaign_id': Value('string'), 'attacker_id': Value('string'), 'timestep': Value('int64'), 'kill_chain_phase': Value('string'), 'technique_id': Value('string'), 'technique_name': Value('string'), 'tactic_category': Value('string'), 'target_segment_id': Value('string'), 'target_asset_type': Value('string'), 'source_ip_class': Value('string'), 'dest_port': Value('int64'), 'protocol': Value('string'), 'bytes_transferred': Value('float64'), 'connection_duration_s': Value('float64'), 'auth_failure_count': Value('int64'), 'process_injection_flag': Value('int64'), 'lateral_hop_count': Value('int64'), 'c2_beacon_interval_s': Value('float64'), 'detection_outcome': Value('string'), 'alert_severity': Value('string'), 'siem_rule_triggered': Value('int64'), 'edr_blocked_flag': Value('int64'), 'attacker_capability_tier': Value('string'), 'defender_maturity_level': Value('string')}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
                  builder.download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
                  self._download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 4 new columns ({'event_type', 'target_asset_id', 'responder_id', 'related_campaign_id'}) and 20 missing columns ({'lateral_hop_count', 'attacker_capability_tier', 'alert_severity', 'process_injection_flag', 'source_ip_class', 'c2_beacon_interval_s', 'tactic_category', 'technique_id', 'kill_chain_phase', 'connection_duration_s', 'auth_failure_count', 'edr_blocked_flag', 'detection_outcome', 'defender_maturity_level', 'technique_name', 'dest_port', 'protocol', 'siem_rule_triggered', 'bytes_transferred', 'target_asset_type'}).
              
              This happened while the csv dataset builder was generating data using
              
              hf://datasets/xpertsystems/cyb002-sample/campaign_events.csv (at revision 230d71ec344f2a35cb347f1a05607b5e19aee971), [/tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/attack_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/61691439811731-config-parquet-and-info-xpertsystems-cyb002-sampl-71d44c72/hub/datasets--xpertsystems--cyb002-sample/snapshots/230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv (origin=hf://datasets/xpertsystems/cyb002-sample@230d71ec344f2a35cb347f1a05607b5e19aee971/network_topology.csv)]
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

campaign_id
string
attacker_id
string
timestep
int64
kill_chain_phase
string
technique_id
string
technique_name
string
tactic_category
string
target_segment_id
string
target_asset_type
string
source_ip_class
string
dest_port
int64
protocol
string
bytes_transferred
float64
connection_duration_s
float64
auth_failure_count
int64
process_injection_flag
int64
lateral_hop_count
int64
c2_beacon_interval_s
float64
detection_outcome
string
alert_severity
string
siem_rule_triggered
int64
edr_blocked_flag
int64
attacker_capability_tier
string
defender_maturity_level
string
CAMP-000000
ATK-0000
0
dwell_idle
T0000
Dwell
null
SEG-0006
domain_controller
internal_lan
143
udp
533.95
15.127
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
1
reconnaissance
T1591
Gather Victim Org Information
Reconnaissance
SEG-0006
server
internal_lan
53
ftp
4,278.12
7.042
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
2
reconnaissance
T1596
Search Open Technical Databases
Reconnaissance
SEG-0006
ehr_system
internal_lan
53
udp
2,166.51
0.834
1
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
3
initial_access
T1566
Phishing
Initial Access
SEG-0006
database_server
vpn_tunnel
25
dns
29,130.64
4.768
3
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
4
initial_access
T1195
Supply Chain Compromise
Initial Access
SEG-0006
domain_controller
vpn_tunnel
25
udp
36,093.32
1.62
1
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
5
dwell_idle
T0000
Dwell
null
SEG-0006
domain_controller
external_internet
23
ftp
1,230,252.08
3.54
3
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
6
initial_access
T1091
Replication Through Removable Media
Initial Access
SEG-0006
iot_device
external_internet
9,001
udp
41,985.61
5.68
3
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
7
initial_access
T1091
Replication Through Removable Media
Initial Access
SEG-0006
backup_system
cloud_egress
135
icmp
692,194.37
2.199
2
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
8
dwell_idle
T0000
Dwell
null
SEG-0006
router
cloud_egress
53
https
4,686.3
8.401
4
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
9
dwell_idle
T0000
Dwell
null
SEG-0006
email_server
external_internet
110
icmp
43,275.7
2.331
4
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
10
initial_access
T1078
Valid Accounts
Initial Access
SEG-0006
domain_controller
vpn_tunnel
8,080
ftp
5,388.04
20.758
7
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
11
initial_access
T1091
Replication Through Removable Media
Initial Access
SEG-0006
domain_controller
tor_exit
110
https
1,035.75
5.842
2
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
12
initial_access
T1091
Replication Through Removable Media
Initial Access
SEG-0006
vpn_gateway
tor_exit
80
rdp
808.25
4.876
2
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
13
initial_access
T1190
Exploit Public-Facing Application
Initial Access
SEG-0006
container
internal_lan
110
udp
1,369.85
3.265
6
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
14
initial_access
T1195
Supply Chain Compromise
Initial Access
SEG-0006
server
tor_exit
443
rdp
23,682.08
8.387
1
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
15
dwell_idle
T0000
Dwell
null
SEG-0006
iot_device
internal_lan
8,443
ftp
32,493.51
6.638
1
1
0
0
blind_spot
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
16
execution
T1047
Windows Management Instrumentation
Execution
SEG-0006
router
tor_exit
22
http
3,931.75
0.708
0
0
0
0
suppressed_alert
low
0
0
apt
advanced
CAMP-000000
ATK-0000
17
execution
T1053
Scheduled Task/Job
Execution
SEG-0006
ehr_system
internal_lan
80
icmp
1,708.67
9.763
0
1
0
0
ir_escalated
critical
1
0
apt
advanced
CAMP-000000
ATK-0000
18
execution
T1106
Native API
Execution
SEG-0006
ehr_system
internal_lan
8,080
tcp
18,741.03
6.579
1
1
0
0
blind_spot
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
19
persistence
T1505
Server Software Component
Persistence
SEG-0006
workstation
tor_exit
143
ftp
223.24
1.764
1
0
0
0
high_confidence_alert
high
1
0
apt
advanced
CAMP-000000
ATK-0000
20
persistence
T1078
Valid Accounts
Persistence
SEG-0006
ehr_system
tor_exit
110
smb
2,742.65
0.561
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
21
persistence
T1574
Hijack Execution Flow
Persistence
SEG-0006
ehr_system
cloud_egress
23
https
1,190.96
9.234
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
22
persistence
T1136
Create Account
Persistence
SEG-0006
server
external_internet
443
rdp
16,163.4
18.607
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
23
dwell_idle
T0000
Dwell
null
SEG-0006
router
internal_lan
22
icmp
157,381.93
0.741
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
24
persistence
T1505
Server Software Component
Persistence
SEG-0006
backup_system
internal_lan
23
ssh
137,309.19
14.261
0
0
0
0
marginal_alert
medium
1
0
apt
advanced
CAMP-000000
ATK-0000
25
persistence
T1547
Boot or Logon Autostart Execution
Persistence
SEG-0006
vpn_gateway
cloud_egress
53
rdp
153.62
9.845
0
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
26
dwell_idle
T0000
Dwell
null
SEG-0006
vpn_gateway
cloud_egress
135
dns
7,968.08
1.523
0
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
27
persistence
T1543
Create or Modify System Process
Persistence
SEG-0006
web_server
vpn_tunnel
445
icmp
2,827.15
2.084
1
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
28
persistence
T1078
Valid Accounts
Persistence
SEG-0006
email_server
external_internet
443
http
5,683.47
5.14
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
29
dwell_idle
T0000
Dwell
null
SEG-0006
router
vpn_tunnel
9,001
http
30,223.68
0.915
0
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
30
persistence
T1078
Valid Accounts
Persistence
SEG-0006
firewall
vpn_tunnel
110
icmp
83,294.81
9.464
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
31
persistence
T1136
Create Account
Persistence
SEG-0006
web_server
vpn_tunnel
80
ftp
10,386.75
1.25
0
0
0
0
suppressed_alert
low
0
0
apt
advanced
CAMP-000000
ATK-0000
32
persistence
T1136
Create Account
Persistence
SEG-0006
firewall
cloud_egress
3,389
http
118,215.91
49.564
0
0
0
0
high_confidence_alert
high
1
0
apt
advanced
CAMP-000000
ATK-0000
33
privilege_escalation
T1611
Escape to Host
Privilege Escalation
SEG-0006
vpn_gateway
cloud_egress
445
ftp
9,019.1
14.925
3
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
34
privilege_escalation
T1055
Process Injection
Privilege Escalation
SEG-0006
database_server
cloud_egress
25
https
39,741.74
9.251
5
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
35
privilege_escalation
T1055
Process Injection
Privilege Escalation
SEG-0006
cloud_vm
vpn_tunnel
22
ftp
7,006.9
1.674
5
1
0
0
blind_spot
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
36
dwell_idle
T0000
Dwell
null
SEG-0006
router
vpn_tunnel
4,444
tcp
12,727.08
50.355
3
1
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
37
privilege_escalation
T1484
Domain Policy Modification
Privilege Escalation
SEG-0006
email_server
internal_lan
135
rdp
4,746.51
24.607
2
1
0
0
high_confidence_alert
high
1
0
apt
advanced
CAMP-000000
ATK-0000
38
dwell_idle
T0000
Dwell
null
SEG-0006
firewall
tor_exit
80
smb
784,335.39
4.395
5
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
39
lateral_movement
T1550
Use Alternate Authentication Material
Lateral Movement
SEG-0006
iot_device
vpn_tunnel
443
rdp
17,957.11
66.891
2
0
0
0
suppressed_alert
low
0
0
apt
advanced
CAMP-000000
ATK-0000
40
lateral_movement
T1210
Exploitation of Remote Services
Lateral Movement
SEG-0006
ehr_system
external_internet
139
https
45,491.81
38.217
1
0
1
0
high_confidence_alert
high
1
0
apt
advanced
CAMP-000000
ATK-0000
41
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
email_server
vpn_tunnel
139
dns
157,931.25
54.402
3
0
1
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
42
lateral_movement
T1570
Lateral Tool Transfer
Lateral Movement
SEG-0006
vpn_gateway
cloud_egress
5,985
https
4,901.96
4.244
7
0
0
0
high_confidence_alert
high
1
0
apt
advanced
CAMP-000000
ATK-0000
43
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
email_server
tor_exit
8,443
udp
1,663.74
3.233
2
0
1
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
44
lateral_movement
T1210
Exploitation of Remote Services
Lateral Movement
SEG-0006
router
internal_lan
22
icmp
317.28
6.157
1
0
1
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
45
lateral_movement
T1534
Internal Spearphishing
Lateral Movement
SEG-0006
ehr_system
cloud_egress
139
icmp
39,089.74
2.291
0
0
1
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
46
lateral_movement
T1550
Use Alternate Authentication Material
Lateral Movement
SEG-0006
database_server
cloud_egress
5,985
smb
2,982.49
6.887
2
0
1
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
47
lateral_movement
T1534
Internal Spearphishing
Lateral Movement
SEG-0006
router
internal_lan
9,001
icmp
4,919.07
92.348
3
0
1
0
blind_spot
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
48
lateral_movement
T1550
Use Alternate Authentication Material
Lateral Movement
SEG-0006
ehr_system
vpn_tunnel
25
http
554,850.32
8.892
2
0
1
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
49
lateral_movement
T1550
Use Alternate Authentication Material
Lateral Movement
SEG-0006
web_server
tor_exit
445
https
5,396.99
32.748
1
1
1
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
50
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
scada_plc
vpn_tunnel
8,443
smb
32,220.34
9.531
2
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
51
lateral_movement
T1563
Remote Service Session Hijacking
Lateral Movement
SEG-0006
container
internal_lan
8,080
ftp
103,091.85
6.454
1
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
52
dwell_idle
T0000
Dwell
null
SEG-0006
scada_plc
internal_lan
80
dns
576,286.72
10.008
2
1
0
0
high_confidence_alert
critical
1
0
apt
advanced
CAMP-000000
ATK-0000
53
lateral_movement
T1021
Remote Services
Lateral Movement
SEG-0006
domain_controller
vpn_tunnel
9,001
https
310,343.04
24.446
4
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
54
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
container
tor_exit
8,443
tcp
7,495.53
14.647
1
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
55
lateral_movement
T1210
Exploitation of Remote Services
Lateral Movement
SEG-0006
firewall
vpn_tunnel
445
ftp
849,621.63
26.879
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
56
lateral_movement
T1570
Lateral Tool Transfer
Lateral Movement
SEG-0006
container
tor_exit
4,444
icmp
909,457.23
4.651
1
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
57
lateral_movement
T1570
Lateral Tool Transfer
Lateral Movement
SEG-0006
iot_device
external_internet
110
https
66,837.19
5.153
2
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
58
lateral_movement
T1550
Use Alternate Authentication Material
Lateral Movement
SEG-0006
workstation
external_internet
25
ftp
45,661.19
25.328
5
0
0
0
blind_spot
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
59
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
vpn_gateway
internal_lan
110
smb
14,966.85
3.523
1
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
60
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
ehr_system
vpn_tunnel
139
dns
64
20.991
2
1
0
0
ir_escalated
critical
1
0
apt
advanced
CAMP-000000
ATK-0000
61
lateral_movement
T1563
Remote Service Session Hijacking
Lateral Movement
SEG-0006
web_server
cloud_egress
80
udp
56,802.09
0.966
2
0
0
0
high_confidence_alert
critical
1
0
apt
advanced
CAMP-000000
ATK-0000
62
lateral_movement
T1080
Taint Shared Content
Lateral Movement
SEG-0006
email_server
tor_exit
8,443
rdp
2,027.07
48.192
1
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
63
lateral_movement
T1021
Remote Services
Lateral Movement
SEG-0006
firewall
vpn_tunnel
9,001
rdp
35,889.99
18.421
1
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000000
ATK-0000
64
collection
T1025
Data from Removable Media
Collection
SEG-0006
server
cloud_egress
25
https
756.47
8.839
0
0
0
0
evasion_success
informational
0
0
apt
advanced
CAMP-000000
ATK-0000
65
collection
T1025
Data from Removable Media
Collection
SEG-0006
web_server
internal_lan
8,443
ftp
5,279.36
5.969
1
0
0
0
suppressed_alert
low
0
0
apt
advanced
CAMP-000000
ATK-0000
66
collection
T1039
Data from Network Shared Drive
Collection
SEG-0006
web_server
internal_lan
80
rdp
1,677.52
3.729
0
0
0
0
edr_blocked
critical
0
1
apt
advanced
CAMP-000001
ATK-0000
0
reconnaissance
T1595
Active Scanning
Reconnaissance
SEG-0005
backup_system
internal_lan
445
dns
34,796.73
13.593
0
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000001
ATK-0000
1
reconnaissance
T1596
Search Open Technical Databases
Reconnaissance
SEG-0005
backup_system
external_internet
8,080
tcp
19,135.61
7.331
0
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000001
ATK-0000
2
dwell_idle
T0000
Dwell
null
SEG-0005
scada_plc
internal_lan
53
ftp
1,919.63
11.268
0
0
0
0
evasion_success
informational
0
0
apt
zero_trust
CAMP-000001
ATK-0000
3
reconnaissance
T1591
Gather Victim Org Information
Reconnaissance
SEG-0005
domain_controller
external_internet
8,443
http
11,141.99
24.439
1
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000001
ATK-0000
4
reconnaissance
T1591
Gather Victim Org Information
Reconnaissance
SEG-0005
server
vpn_tunnel
4,444
ssh
671.63
2.124
0
0
0
0
suppressed_alert
low
0
0
apt
zero_trust
CAMP-000001
ATK-0000
5
reconnaissance
T1598
Phishing for Information
Reconnaissance
SEG-0005
scada_plc
cloud_egress
443
rdp
4,966.82
1.265
0
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000001
ATK-0000
6
reconnaissance
T1596
Search Open Technical Databases
Reconnaissance
SEG-0005
web_server
vpn_tunnel
4,444
udp
249.92
11.483
0
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000001
ATK-0000
7
reconnaissance
T1589
Gather Victim Identity Information
Reconnaissance
SEG-0005
workstation
cloud_egress
4,444
icmp
54,696.17
6.496
0
0
0
0
ir_escalated
critical
1
0
apt
zero_trust
CAMP-000001
ATK-0000
8
reconnaissance
T1595
Active Scanning
Reconnaissance
SEG-0005
firewall
vpn_tunnel
3,389
dns
6,386.2
0.954
1
0
0
0
marginal_alert
medium
1
0
apt
zero_trust
CAMP-000001
ATK-0000
9
reconnaissance
T1591
Gather Victim Org Information
Reconnaissance
SEG-0005
email_server
tor_exit
23
dns
103,009.4
2.261
0
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000001
ATK-0000
10
reconnaissance
T1592
Gather Victim Host Information
Reconnaissance
SEG-0005
server
external_internet
8,443
rdp
569,815.41
42.088
0
0
0
0
high_confidence_alert
high
1
0
apt
zero_trust
CAMP-000001
ATK-0000
11
initial_access
T1200
Hardware Additions
Initial Access
SEG-0005
iot_device
cloud_egress
445
http
4,709.22
42.857
6
0
0
0
edr_blocked
critical
0
1
apt
zero_trust
CAMP-000002
ATK-0000
0
reconnaissance
T1598
Phishing for Information
Reconnaissance
SEG-0010
firewall
tor_exit
110
dns
62,644.38
11.761
0
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
1
reconnaissance
T1596
Search Open Technical Databases
Reconnaissance
SEG-0010
iot_device
external_internet
143
ftp
1,898.96
10.368
0
0
0
0
evasion_success
informational
0
0
apt
baseline
CAMP-000002
ATK-0000
2
dwell_idle
T0000
Dwell
null
SEG-0010
scada_plc
tor_exit
3,389
rdp
13,941.33
5.709
2
0
0
0
ir_escalated
critical
1
0
apt
baseline
CAMP-000002
ATK-0000
3
initial_access
T1566
Phishing
Initial Access
SEG-0010
server
internal_lan
23
http
14,283.44
4.121
2
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
4
initial_access
T1190
Exploit Public-Facing Application
Initial Access
SEG-0010
container
vpn_tunnel
445
ftp
67,981.43
3.488
6
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
5
initial_access
T1190
Exploit Public-Facing Application
Initial Access
SEG-0010
domain_controller
vpn_tunnel
139
icmp
3,444.66
5.226
3
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
6
execution
T1053
Scheduled Task/Job
Execution
SEG-0010
firewall
external_internet
25
dns
545.13
21.155
0
1
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
7
execution
T1204
User Execution
Execution
SEG-0010
container
cloud_egress
5,985
https
2,504.09
19.008
1
1
0
0
evasion_success
informational
0
0
apt
baseline
CAMP-000002
ATK-0000
8
execution
T1072
Software Deployment Tools
Execution
SEG-0010
vpn_gateway
vpn_tunnel
445
smb
6,507.73
5.989
1
1
0
0
evasion_success
informational
0
0
apt
baseline
CAMP-000002
ATK-0000
9
execution
T1204
User Execution
Execution
SEG-0010
iot_device
internal_lan
8,080
rdp
204,549.63
4.212
2
1
0
0
high_confidence_alert
high
1
0
apt
baseline
CAMP-000002
ATK-0000
10
execution
T1203
Exploitation for Client Execution
Execution
SEG-0010
web_server
external_internet
8,080
smb
7,722.63
1.327
2
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
11
dwell_idle
T0000
Dwell
null
SEG-0010
scada_plc
vpn_tunnel
9,001
ssh
2,900.98
1.695
0
0
0
0
evasion_success
informational
0
0
apt
baseline
CAMP-000002
ATK-0000
12
persistence
T1547
Boot or Logon Autostart Execution
Persistence
SEG-0010
container
tor_exit
3,389
udp
10,222.33
10.729
0
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
13
dwell_idle
T0000
Dwell
null
SEG-0010
database_server
vpn_tunnel
5,985
http
310,634.05
21.523
0
0
0
0
blind_spot
informational
0
0
apt
baseline
CAMP-000002
ATK-0000
14
persistence
T1547
Boot or Logon Autostart Execution
Persistence
SEG-0010
router
vpn_tunnel
22
udp
191,369.79
1.099
0
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
15
privilege_escalation
T1134
Access Token Manipulation
Privilege Escalation
SEG-0010
vpn_gateway
tor_exit
5,985
udp
216,698.05
17.171
3
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
16
dwell_idle
T0000
Dwell
null
SEG-0010
database_server
cloud_egress
4,444
udp
10,096.45
12.063
3
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
17
dwell_idle
T0000
Dwell
null
SEG-0010
database_server
external_internet
53
ssh
1,575.23
29.391
3
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
18
privilege_escalation
T1484
Domain Policy Modification
Privilege Escalation
SEG-0010
server
vpn_tunnel
8,443
smb
7,538.46
14.211
4
0
0
0
edr_blocked
critical
0
1
apt
baseline
CAMP-000002
ATK-0000
19
privilege_escalation
T1546
Event Triggered Execution
Privilege Escalation
SEG-0010
email_server
cloud_egress
53
dns
8,848.26
1.896
4
0
0
0
evasion_success
informational
0
0
apt
baseline
CAMP-000002
ATK-0000
20
privilege_escalation
T1546
Event Triggered Execution
Privilege Escalation
SEG-0010
backup_system
internal_lan
3,389
icmp
1,585.58
2.429
2
0
0
0
edr_blocked
critical
0
1
apt
baseline
End of preview.

CYB002 — Synthetic Cyber Attack Dataset (Sample)

XpertSystems.ai Synthetic Data Platform · SKU: CYB002-SAMPLE · Version 1.0.0

This is a free preview of the full CYB002 — Synthetic Cyber Attack Dataset product. It contains roughly 1 / 60th of the full dataset at identical schema, attacker-tier distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.

🤖 Trained baseline available: xpertsystems/cyb002-baseline-classifier — XGBoost + PyTorch MLP for 10-class MITRE ATT&CK kill-chain phase prediction, group-aware split by campaign, ablation evidence, honest limitations in the model card.

File Rows (sample) Rows (full) Description
network_topology.csv ~651 ~3,200 Network segments and asset inventory
campaign_summary.csv ~100 ~6,000 Per-campaign outcome aggregates
campaign_events.csv ~739 ~65,000 Discrete campaign event log
attack_events.csv ~4,353 ~380,000 Timestep-level kill-chain events

Dataset Summary

CYB002 simulates end-to-end cyber attack lifecycles as a 9-phase MITRE ATT&CK kill-chain state machine across enterprise, cloud, endpoint, and OT/ICS environments, with:

  • 9 ATT&CK phases: reconnaissance, resource_development, initial_access, execution, persistence, privilege_escalation, defense_evasion, lateral_movement, exfiltration
  • 4 attacker capability tiers: opportunistic, organized_crime, apt, nation_state — with per-tier dwell time, lateral hop rate, and stealth weight distributions
  • 5 defender maturity levels: ad_hoc, defined, managed, quantitatively_ managed, optimizing
  • MITRE ATT&CK technique catalogue with representative subset of Enterprise v14 techniques mapped to each phase
  • EDR coverage modelling with configurable effectiveness
  • Ransomware deployment, supply chain compromise, and exfiltration outcome paths

Trained Baseline Available

A working baseline classifier trained on this sample is published at xpertsystems/cyb002-baseline-classifier.

Component Detail
Task 10-class MITRE ATT&CK kill-chain phase classification
Models XGBoost (model_xgb.json) + PyTorch MLP (model_mlp.safetensors)
Features 90 (after one-hot encoding); pipeline included as feature_engineering.py
Split Group-aware by campaign_id — train/val/test campaigns disjoint
Demo inference_example.ipynb — end-to-end copy-paste
Headline metrics XGBoost macro ROC-AUC 0.86; accuracy 47% (vs 19% always-majority baseline)

The model card documents the three columns excluded for label leakage (technique_id, technique_name, tactic_category), an ablation showing timestep carries most of the phase signal, and six explicit limitations including the gap between synthetic and real attack telemetry. Late-stage phases (collection / exfiltration / impact) are genuinely harder for a flat-tabular event-level model — the baseline exposes this honestly.

Calibrated Benchmark Targets

The full product is calibrated to 12 benchmark metrics drawn from authoritative threat intelligence sources (Mandiant M-Trends, IBM CODB, Verizon DBIR, CrowdStrike GTR, MITRE ATT&CK Evaluations, SANS, ENISA). The sample preserves the same calibration. Observed values on this sample:

Test Target Observed Verdict
dwell_time_hours_apt 21.0000 21.1595 ✓ PASS
detection_rate_advanced 0.8600 0.8600 ✓ PASS
exfiltration_success_rate 0.3100 0.3000 ✓ PASS
lateral_hop_rate_apt 0.0720 0.0552 ✓ PASS
suppressed_alert_rate 0.0770 0.0719 ✓ PASS
mttd_hours_advanced 4.2000 3.3541 ✓ PASS
mttr_hours_advanced 18.0000 19.7415 ✓ PASS
ransomware_deployment_rate 0.2400 0.2100 ✓ PASS
campaign_success_rate 0.3400 0.4300 ~ MARGINAL
privilege_escalation_rate 0.6200 0.6600 ✓ PASS
edr_block_rate 0.4300 0.3680 ~ MARGINAL
supply_chain_compromise_rate 0.0850 0.0800 ✓ PASS

Note: some benchmarks (e.g. APT dwell time, MTTR) require larger sample sizes to converge. The full product passes all 12 benchmarks at Grade A-.

Schema Highlights

attack_events.csv (primary file, timestep-level)

Column Type Description
campaign_id string Parent campaign FK
attacker_id string Attacker FK
timestep int Step in kill-chain simulation
phase string 1 of 9 ATT&CK phases
technique_id string MITRE ATT&CK technique ID (e.g. T1059.001)
technique_name string Human-readable technique name
tactic string ATT&CK tactic category
segment_id string FK to network_topology.csv
asset_id string Target asset within segment
attacker_tier string opportunistic / organized_crime / apt / nation_state
defender_maturity string ad_hoc / defined / managed / quant / optimizing
stealth_score float Action stealth weight (0–1)
detected int Whether action was detected (0/1)
blocked int Whether action was blocked (0/1)
edr_deployed int EDR present on target asset
alert_severity string INFO / LOW / MEDIUM / HIGH / CRITICAL
dwell_hours_so_far float Cumulative dwell time at this step

campaign_summary.csv (per-campaign outcome)

Column Type Description
campaign_id, attacker_id string Identifiers
attacker_tier, defender_maturity string Categorical
campaign_outcome string success / detected / blocked / aborted
total_dwell_hours float End-to-end attacker dwell time
mttd_hours, mttr_hours float Mean time to detect / respond
exfiltrated_bytes int Bytes exfiltrated (0 if none)
ransomware_deployed int Boolean
lateral_hops int Count of lateral movement actions
privilege_escalated int Boolean
supply_chain_used int Boolean

See campaign_events.csv and network_topology.csv for the discrete event log and asset inventory schemas respectively.

Suggested Use Cases

  • Training kill-chain phase classifiers (predict next ATT&CK phase) — worked example available
  • Benchmarking APT detection algorithms (long dwell, low stealth_score)
  • Campaign outcome prediction (success / detected / blocked / aborted)
  • MTTD / MTTR forecasting under varying defender maturity
  • Ransomware risk modelling across attacker tiers
  • Red-team simulation training data for purple-team exercises
  • SOC alert triage benchmarking with realistic severity distributions

Loading the Data

import pandas as pd

attacks    = pd.read_csv("attack_events.csv")
campaigns  = pd.read_csv("campaign_summary.csv")
events     = pd.read_csv("campaign_events.csv")
topology   = pd.read_csv("network_topology.csv")

# Join to get the full attack context
enriched = attacks.merge(campaigns, on=["campaign_id", "attacker_id"], how="left")
enriched = enriched.merge(topology, on="segment_id", how="left")

# Binary detection target
y = attacks["detected"].astype(int)

# Campaign-level outcome target
y_outcome = campaigns["campaign_outcome"]

For a worked end-to-end example with the 10-class kill-chain phase target, group-aware splitting, and feature engineering, see the inference notebook in the baseline classifier repo.

License

This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.

Full Product

The full CYB002 dataset includes ~454,000 rows across all four files, with calibrated benchmark validation against 12 metrics drawn from authoritative threat intelligence sources.

📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai

Citation

@dataset{xpertsystems_cyb002_sample_2026,
  title  = {CYB002: Synthetic Cyber Attack Dataset (Sample)},
  author = {XpertSystems.ai},
  year   = {2026},
  url    = {https://huggingface.co/datasets/xpertsystems/cyb002-sample}
}

Generation Details

  • Generator version : 2.0.0
  • Random seed : 42
  • Generated : 2026-05-16 13:39:22 UTC
  • Kill-chain model : 9-phase MITRE ATT&CK state machine
  • Overall benchmark : 95.3 / 100 (grade A)
Downloads last month
28

Models trained or fine-tuned on xpertsystems/cyb002-sample