File size: 10,516 Bytes
230d71e 5f80e6a 230d71e 5f80e6a 230d71e 5f80e6a 230d71e 5f80e6a 230d71e | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 | ---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- mitre-attack
- kill-chain
- apt
- ransomware
- synthetic-data
- threat-modeling
- red-team
- blue-team
pretty_name: CYB002 — Synthetic Cyber Attack Dataset (Sample)
size_categories:
- 1K<n<10K
---
# CYB002 — Synthetic Cyber Attack Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB002-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB002 — Synthetic Cyber Attack
Dataset** product. It contains roughly **1 / 60th of the full dataset** at
identical schema, attacker-tier distribution, and statistical fingerprint, so
you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb002-baseline-classifier**](https://huggingface.co/xpertsystems/cyb002-baseline-classifier)
> — XGBoost + PyTorch MLP for 10-class MITRE ATT&CK kill-chain phase
> prediction, group-aware split by campaign, ablation evidence,
> honest limitations in the model card.
| File | Rows (sample) | Rows (full) | Description |
|-------------------------|---------------|---------------|----------------------------------------------|
| `network_topology.csv` | ~651 | ~3,200 | Network segments and asset inventory |
| `campaign_summary.csv` | ~100 | ~6,000 | Per-campaign outcome aggregates |
| `campaign_events.csv` | ~739 | ~65,000 | Discrete campaign event log |
| `attack_events.csv` | ~4,353 | ~380,000 | Timestep-level kill-chain events |
## Dataset Summary
CYB002 simulates end-to-end cyber attack lifecycles as a **9-phase MITRE
ATT&CK kill-chain state machine** across enterprise, cloud, endpoint, and
OT/ICS environments, with:
- **9 ATT&CK phases**: reconnaissance, resource_development, initial_access,
execution, persistence, privilege_escalation, defense_evasion,
lateral_movement, exfiltration
- **4 attacker capability tiers**: opportunistic, organized_crime, apt,
nation_state — with per-tier dwell time, lateral hop rate, and stealth
weight distributions
- **5 defender maturity levels**: ad_hoc, defined, managed, quantitatively_
managed, optimizing
- **MITRE ATT&CK technique catalogue** with representative subset of
Enterprise v14 techniques mapped to each phase
- **EDR coverage modelling** with configurable effectiveness
- **Ransomware deployment, supply chain compromise, and exfiltration**
outcome paths
## Trained Baseline Available
A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb002-baseline-classifier](https://huggingface.co/xpertsystems/cyb002-baseline-classifier)**.
| Component | Detail |
|---|---|
| Task | 10-class MITRE ATT&CK kill-chain phase classification |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 90 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware by campaign_id** — train/val/test campaigns disjoint |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost macro ROC-AUC 0.86; accuracy 47% (vs 19% always-majority baseline) |
The model card documents the three columns excluded for label leakage
(`technique_id`, `technique_name`, `tactic_category`), an ablation
showing `timestep` carries most of the phase signal, and six explicit
limitations including the gap between synthetic and real attack
telemetry. Late-stage phases (collection / exfiltration / impact) are
genuinely harder for a flat-tabular event-level model — the baseline
exposes this honestly.
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics drawn from
authoritative threat intelligence sources (Mandiant M-Trends, IBM CODB,
Verizon DBIR, CrowdStrike GTR, MITRE ATT&CK Evaluations, SANS, ENISA).
The sample preserves the same calibration. Observed values on this sample:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| dwell_time_hours_apt | 21.0000 | 21.1595 | ✓ PASS |
| detection_rate_advanced | 0.8600 | 0.8600 | ✓ PASS |
| exfiltration_success_rate | 0.3100 | 0.3000 | ✓ PASS |
| lateral_hop_rate_apt | 0.0720 | 0.0552 | ✓ PASS |
| suppressed_alert_rate | 0.0770 | 0.0719 | ✓ PASS |
| mttd_hours_advanced | 4.2000 | 3.3541 | ✓ PASS |
| mttr_hours_advanced | 18.0000 | 19.7415 | ✓ PASS |
| ransomware_deployment_rate | 0.2400 | 0.2100 | ✓ PASS |
| campaign_success_rate | 0.3400 | 0.4300 | ~ MARGINAL |
| privilege_escalation_rate | 0.6200 | 0.6600 | ✓ PASS |
| edr_block_rate | 0.4300 | 0.3680 | ~ MARGINAL |
| supply_chain_compromise_rate | 0.0850 | 0.0800 | ✓ PASS |
*Note: some benchmarks (e.g. APT dwell time, MTTR) require larger sample
sizes to converge. The full product passes all 12 benchmarks at Grade A-.*
## Schema Highlights
### `attack_events.csv` (primary file, timestep-level)
| Column | Type | Description |
|------------------------------|---------|----------------------------------------------|
| campaign_id | string | Parent campaign FK |
| attacker_id | string | Attacker FK |
| timestep | int | Step in kill-chain simulation |
| phase | string | 1 of 9 ATT&CK phases |
| technique_id | string | MITRE ATT&CK technique ID (e.g. T1059.001) |
| technique_name | string | Human-readable technique name |
| tactic | string | ATT&CK tactic category |
| segment_id | string | FK to `network_topology.csv` |
| asset_id | string | Target asset within segment |
| attacker_tier | string | opportunistic / organized_crime / apt / nation_state |
| defender_maturity | string | ad_hoc / defined / managed / quant / optimizing |
| stealth_score | float | Action stealth weight (0–1) |
| detected | int | Whether action was detected (0/1) |
| blocked | int | Whether action was blocked (0/1) |
| edr_deployed | int | EDR present on target asset |
| alert_severity | string | INFO / LOW / MEDIUM / HIGH / CRITICAL |
| dwell_hours_so_far | float | Cumulative dwell time at this step |
### `campaign_summary.csv` (per-campaign outcome)
| Column | Type | Description |
|---------------------------------|---------|--------------------------------------------|
| campaign_id, attacker_id | string | Identifiers |
| attacker_tier, defender_maturity| string | Categorical |
| campaign_outcome | string | success / detected / blocked / aborted |
| total_dwell_hours | float | End-to-end attacker dwell time |
| mttd_hours, mttr_hours | float | Mean time to detect / respond |
| exfiltrated_bytes | int | Bytes exfiltrated (0 if none) |
| ransomware_deployed | int | Boolean |
| lateral_hops | int | Count of lateral movement actions |
| privilege_escalated | int | Boolean |
| supply_chain_used | int | Boolean |
See `campaign_events.csv` and `network_topology.csv` for the discrete event
log and asset inventory schemas respectively.
## Suggested Use Cases
- Training **kill-chain phase classifiers** (predict next ATT&CK phase) —
[worked example available](https://huggingface.co/xpertsystems/cyb002-baseline-classifier)
- Benchmarking **APT detection** algorithms (long dwell, low stealth_score)
- **Campaign outcome prediction** (success / detected / blocked / aborted)
- **MTTD / MTTR forecasting** under varying defender maturity
- **Ransomware risk modelling** across attacker tiers
- **Red-team simulation training data** for purple-team exercises
- **SOC alert triage** benchmarking with realistic severity distributions
## Loading the Data
```python
import pandas as pd
attacks = pd.read_csv("attack_events.csv")
campaigns = pd.read_csv("campaign_summary.csv")
events = pd.read_csv("campaign_events.csv")
topology = pd.read_csv("network_topology.csv")
# Join to get the full attack context
enriched = attacks.merge(campaigns, on=["campaign_id", "attacker_id"], how="left")
enriched = enriched.merge(topology, on="segment_id", how="left")
# Binary detection target
y = attacks["detected"].astype(int)
# Campaign-level outcome target
y_outcome = campaigns["campaign_outcome"]
```
For a worked end-to-end example with the 10-class kill-chain phase target,
group-aware splitting, and feature engineering, see the inference notebook
in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb002-baseline-classifier/blob/main/inference_example.ipynb).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB002 dataset includes **~454,000 rows** across all four files,
with calibrated benchmark validation against 12 metrics drawn from
authoritative threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb002_sample_2026,
title = {CYB002: Synthetic Cyber Attack Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb002-sample}
}
```
## Generation Details
- Generator version : 2.0.0
- Random seed : 42
- Generated : 2026-05-16 13:39:22 UTC
- Kill-chain model : 9-phase MITRE ATT&CK state machine
- Overall benchmark : 95.3 / 100 (grade A)
|