File size: 11,646 Bytes
ecf6a42
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
d96b323
 
 
 
 
 
ecf6a42
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
d96b323
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
ecf6a42
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
d96b323
 
ecf6a42
d96b323
 
ecf6a42
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
d96b323
 
 
 
ecf6a42
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
---
license: cc-by-nc-4.0
task_categories:
  - tabular-classification
  - time-series-forecasting
tags:
  - cybersecurity
  - malware
  - malware-classification
  - threat-intelligence
  - apt
  - ransomware
  - synthetic-data
  - edr
  - sandbox-evasion
  - polymorphic
pretty_name: CYB003  Synthetic Malware Behaviour & Classification (Sample)
size_categories:
  - 1K<n<10K
---

# CYB003 — Synthetic Malware Behaviour & Classification Dataset (Sample)

**XpertSystems.ai Synthetic Data Platform · SKU: CYB003-SAMPLE · Version 1.0.0**

This is a **free preview** of the full **CYB003 — Synthetic Malware Behaviour
& Classification Dataset** product. It contains roughly **1 / 56th of the
full dataset** at identical schema, family/tier distribution, and statistical
fingerprint, so you can evaluate fit before licensing the full product.

> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb003-baseline-classifier**](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)
> — XGBoost + PyTorch MLP for 10-class malware execution-phase prediction,
> group-aware split by sample, multi-seed evaluation (accuracy 0.905 ± 0.010),
> honest disclosure of which tasks need the full dataset.

| File                       | Rows (sample) | Rows (full)   | Description                                    |
|----------------------------|---------------|---------------|------------------------------------------------|
| `environment_profiles.csv` | ~100            | ~3,200        | Endpoint environment configurations            |
| `sample_summary.csv`       | ~100           | ~5,600        | Per-sample aggregate KPIs                      |
| `execution_events.csv`     | ~1,056         | ~60,000       | Discrete malware lifecycle events              |
| `malware_samples.csv`      | ~6,000         | ~280,000      | Per-timestep sample telemetry                  |

## Dataset Summary

CYB003 simulates malware execution lifecycles across endpoint protection
stacks with calibrated detection/evasion outcomes, covering:

- **9 malware families**: ransomware, trojan, rootkit, worm, spyware,
  fileless_malware, cryptominer, botnet_agent, dropper
- **4 threat-actor tiers**: commodity, crimeware, apt, nation_state — with
  per-tier sandbox evasion budgets, LotL (Living-off-the-Land) abuse rates,
  and polymorphic mutation probabilities
- **Endpoint protection stacks**: legacy AV, NGAV (ML-based), EDR
- **Static PE features**: entropy, packing detection, section anomalies,
  import hash distributions
- **Behavioural telemetry**: process injection, persistence mechanisms,
  C2 beacon patterns, lateral spread
- **Outcome modelling**: AV signature detection, EDR behavioural detection,
  sandbox evasion success, family attribution confidence

## Trained Baseline Available

A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb003-baseline-classifier](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)**.

| Component | Detail |
|---|---|
| Task | 10-class malware execution-phase classification |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 69 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware by sample_id** — train/val/test samples disjoint |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.905 ± 0.010, macro ROC-AUC 0.975 ± 0.002 (multi-seed) |

The model card documents an honest finding worth knowing before licensing:
**malware-family classification is at majority baseline on the sample's 100
samples** (a sample-size constraint, not a method failure — the full
280k-row dataset has ~5,600 samples and supports family classification
properly). The baseline pivots to **execution-phase prediction**, which is
strongly learnable on the sample data (91% accuracy, ROC-AUC 0.98, stable
across 10 seeds) and is itself a real SOC use case for dynamic-analysis
and EDR phase tagging.

## Calibrated Benchmark Targets

The full product is calibrated to 12 benchmark metrics drawn from
authoritative threat intelligence and AV-testing sources (VirusTotal,
AV-TEST, MITRE ATT&CK Evaluations, Mandiant M-Trends, CrowdStrike GTR,
Verizon DBIR). The sample preserves the same calibration:

| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| av_detection_rate_commodity | 0.6200 | 0.6319 | ✓ PASS |
| edr_detection_rate_apt | 0.3100 | 0.3096 | ✓ PASS |
| sandbox_evasion_rate_nation | 0.7200 | 0.7225 | ✓ PASS |
| lateral_propagation_rate | 0.0950 | 0.1038 | ✓ PASS |
| pe_entropy_mean_packed | 0.9100 | 0.9100 | ✓ PASS |
| lotl_abuse_rate_apt | 0.4300 | 0.4300 | ✓ PASS |
| dwell_time_ratio_apt | 0.3200 | 0.3198 | ✓ PASS |
| family_attribution_confidence | 0.6800 | 0.6808 | ✓ PASS |
| c2_detection_rate | 0.5400 | 0.5394 | ✓ PASS |
| campaign_success_rate | 0.3400 | 0.2900 | ✓ PASS |
| polymorphic_detection_penalty | 0.2400 | 0.2392 | ✓ PASS |
| false_negative_rate_fileless | 0.3800 | 0.4203 | ✓ PASS |

*Note: some benchmarks (e.g. campaign success rate, lateral propagation)
require larger sample sizes to converge tightly. The full product passes
all 12 benchmarks at Grade A- or better.*

## Schema Highlights

### `malware_samples.csv` (primary file, per-timestep telemetry)

| Column                       | Type    | Description                                  |
|------------------------------|---------|----------------------------------------------|
| sample_id                    | string  | Unique malware sample identifier             |
| family_id                    | string  | Malware family instance ID                   |
| actor_id                     | string  | Threat actor ID                              |
| timestep                     | int     | Step in malware lifecycle (0–59)             |
| malware_family               | string  | 1 of 9 families                              |
| threat_actor_tier            | string  | commodity / crimeware / apt / nation_state   |
| target_platform              | string  | windows / linux / macos / android            |
| ep_stack                     | string  | legacy_av / ngav_ml_based / edr_full         |
| pe_entropy                   | float   | Portable Executable section entropy (0–1)    |
| packer_detected_flag         | int     | Whether PE packer was detected               |
| process_injection_count      | int     | Process-injection events at this step        |
| persistence_mechanism        | string  | registry / scheduled_task / service / wmi    |
| c2_beacon_active             | int     | Whether C2 channel is beaconing              |
| sandbox_evaded               | int     | Whether sandbox evasion succeeded            |
| av_detected                  | int     | AV signature detection at this step          |
| edr_detected                 | int     | EDR behavioural detection at this step       |
| dwell_time_hours             | float   | Cumulative dwell time                        |
| lotl_technique_used          | string  | Living-off-the-Land binary if any            |

### `sample_summary.csv` (per-sample outcome)

| Column                            | Type    | Description                              |
|-----------------------------------|---------|------------------------------------------|
| sample_id, family_id, actor_id    | string  | Identifiers                              |
| malware_family                    | string  | Family classification target             |
| threat_actor_tier                 | string  | Tier classification target               |
| target_platform                   | string  | Platform                                 |
| campaign_success_flag             | int     | Boolean — successful campaign            |
| av_detection_flag                 | int     | Boolean — AV detection ever              |
| edr_detection_flag                | int     | Boolean — EDR detection ever             |
| sandbox_evaded_flag               | int     | Boolean — sandbox evasion ever           |
| packer_detected_flag              | int     | Boolean — packer detected                |
| family_attribution_confidence     | float   | Confidence score (0–1)                   |
| total_dwell_hours                 | float   | End-to-end dwell                         |
| lateral_propagation_count         | int     | Count of lateral spread events           |

See `execution_events.csv` and `environment_profiles.csv` for the discrete
event log and endpoint environment schemas respectively.

## Suggested Use Cases

- Training **malware execution-phase classifiers**
  [worked example available](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)
- Training **malware family classifiers** (9-class with realistic class
  imbalance and family-specific feature distributions — full dataset
  recommended for adequate per-class sample size)
- **Threat actor attribution** modelling (4-tier classification)
- **EDR detection benchmarking** — packed vs unpacked, signature vs
  behavioural, fileless vs binary
- **Sandbox evasion detection** with tier-calibrated evasion budgets
- **Polymorphic malware detection** — sample mutation effects on AV
  signature coverage
- **C2 beacon detection** with realistic beacon-active timestep patterns
- **PE entropy / packing detection** — entropy distributions tied to
  ground-truth packing flags
- **Living-off-the-Land binary detection** for APT-tier samples

## Loading the Data

```python
import pandas as pd

samples    = pd.read_csv("malware_samples.csv")
summaries  = pd.read_csv("sample_summary.csv")
events     = pd.read_csv("execution_events.csv")
environments = pd.read_csv("environment_profiles.csv")

# Join per-timestep telemetry with per-sample summary labels
enriched = samples.merge(summaries, on="sample_id", how="left",
                         suffixes=("", "_summary"))

# Family classification target
y_family = summaries["malware_family"]

# Threat-actor tier target
y_tier = summaries["threat_actor_tier"]

# Binary detection target (per-timestep)
y_detected = (samples["av_detected"] | samples["edr_detected"]).astype(int)
```

For a worked end-to-end example with execution-phase classification,
group-aware splitting, and feature engineering, see the inference notebook
in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb003-baseline-classifier/blob/main/inference_example.ipynb).

## License

This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.

## Full Product

The full CYB003 dataset includes **~349,000 rows** across all four files,
with calibrated benchmark validation against 12 metrics drawn from
authoritative AV-testing and threat intelligence sources.

📧  **pradeep@xpertsystems.ai**
🌐  **https://xpertsystems.ai**

## Citation

```bibtex
@dataset{xpertsystems_cyb003_sample_2026,
  title  = {CYB003: Synthetic Malware Behaviour & Classification Dataset (Sample)},
  author = {XpertSystems.ai},
  year   = {2026},
  url    = {https://huggingface.co/datasets/xpertsystems/cyb003-sample}
}
```

## Generation Details

- Generator version : 1.0.0
- Random seed       : 42
- Generated         : 2026-05-16 13:46:05 UTC
- Lifecycle model   : Multi-timestep PE + behavioural + outcome simulation
- Overall benchmark : 100.0 / 100  (grade A+)