File size: 11,646 Bytes
ecf6a42 d96b323 ecf6a42 d96b323 ecf6a42 d96b323 ecf6a42 d96b323 ecf6a42 d96b323 ecf6a42 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 | ---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- malware
- malware-classification
- threat-intelligence
- apt
- ransomware
- synthetic-data
- edr
- sandbox-evasion
- polymorphic
pretty_name: CYB003 — Synthetic Malware Behaviour & Classification (Sample)
size_categories:
- 1K<n<10K
---
# CYB003 — Synthetic Malware Behaviour & Classification Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB003-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB003 — Synthetic Malware Behaviour
& Classification Dataset** product. It contains roughly **1 / 56th of the
full dataset** at identical schema, family/tier distribution, and statistical
fingerprint, so you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb003-baseline-classifier**](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)
> — XGBoost + PyTorch MLP for 10-class malware execution-phase prediction,
> group-aware split by sample, multi-seed evaluation (accuracy 0.905 ± 0.010),
> honest disclosure of which tasks need the full dataset.
| File | Rows (sample) | Rows (full) | Description |
|----------------------------|---------------|---------------|------------------------------------------------|
| `environment_profiles.csv` | ~100 | ~3,200 | Endpoint environment configurations |
| `sample_summary.csv` | ~100 | ~5,600 | Per-sample aggregate KPIs |
| `execution_events.csv` | ~1,056 | ~60,000 | Discrete malware lifecycle events |
| `malware_samples.csv` | ~6,000 | ~280,000 | Per-timestep sample telemetry |
## Dataset Summary
CYB003 simulates malware execution lifecycles across endpoint protection
stacks with calibrated detection/evasion outcomes, covering:
- **9 malware families**: ransomware, trojan, rootkit, worm, spyware,
fileless_malware, cryptominer, botnet_agent, dropper
- **4 threat-actor tiers**: commodity, crimeware, apt, nation_state — with
per-tier sandbox evasion budgets, LotL (Living-off-the-Land) abuse rates,
and polymorphic mutation probabilities
- **Endpoint protection stacks**: legacy AV, NGAV (ML-based), EDR
- **Static PE features**: entropy, packing detection, section anomalies,
import hash distributions
- **Behavioural telemetry**: process injection, persistence mechanisms,
C2 beacon patterns, lateral spread
- **Outcome modelling**: AV signature detection, EDR behavioural detection,
sandbox evasion success, family attribution confidence
## Trained Baseline Available
A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb003-baseline-classifier](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)**.
| Component | Detail |
|---|---|
| Task | 10-class malware execution-phase classification |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 69 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware by sample_id** — train/val/test samples disjoint |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.905 ± 0.010, macro ROC-AUC 0.975 ± 0.002 (multi-seed) |
The model card documents an honest finding worth knowing before licensing:
**malware-family classification is at majority baseline on the sample's 100
samples** (a sample-size constraint, not a method failure — the full
280k-row dataset has ~5,600 samples and supports family classification
properly). The baseline pivots to **execution-phase prediction**, which is
strongly learnable on the sample data (91% accuracy, ROC-AUC 0.98, stable
across 10 seeds) and is itself a real SOC use case for dynamic-analysis
and EDR phase tagging.
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics drawn from
authoritative threat intelligence and AV-testing sources (VirusTotal,
AV-TEST, MITRE ATT&CK Evaluations, Mandiant M-Trends, CrowdStrike GTR,
Verizon DBIR). The sample preserves the same calibration:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| av_detection_rate_commodity | 0.6200 | 0.6319 | ✓ PASS |
| edr_detection_rate_apt | 0.3100 | 0.3096 | ✓ PASS |
| sandbox_evasion_rate_nation | 0.7200 | 0.7225 | ✓ PASS |
| lateral_propagation_rate | 0.0950 | 0.1038 | ✓ PASS |
| pe_entropy_mean_packed | 0.9100 | 0.9100 | ✓ PASS |
| lotl_abuse_rate_apt | 0.4300 | 0.4300 | ✓ PASS |
| dwell_time_ratio_apt | 0.3200 | 0.3198 | ✓ PASS |
| family_attribution_confidence | 0.6800 | 0.6808 | ✓ PASS |
| c2_detection_rate | 0.5400 | 0.5394 | ✓ PASS |
| campaign_success_rate | 0.3400 | 0.2900 | ✓ PASS |
| polymorphic_detection_penalty | 0.2400 | 0.2392 | ✓ PASS |
| false_negative_rate_fileless | 0.3800 | 0.4203 | ✓ PASS |
*Note: some benchmarks (e.g. campaign success rate, lateral propagation)
require larger sample sizes to converge tightly. The full product passes
all 12 benchmarks at Grade A- or better.*
## Schema Highlights
### `malware_samples.csv` (primary file, per-timestep telemetry)
| Column | Type | Description |
|------------------------------|---------|----------------------------------------------|
| sample_id | string | Unique malware sample identifier |
| family_id | string | Malware family instance ID |
| actor_id | string | Threat actor ID |
| timestep | int | Step in malware lifecycle (0–59) |
| malware_family | string | 1 of 9 families |
| threat_actor_tier | string | commodity / crimeware / apt / nation_state |
| target_platform | string | windows / linux / macos / android |
| ep_stack | string | legacy_av / ngav_ml_based / edr_full |
| pe_entropy | float | Portable Executable section entropy (0–1) |
| packer_detected_flag | int | Whether PE packer was detected |
| process_injection_count | int | Process-injection events at this step |
| persistence_mechanism | string | registry / scheduled_task / service / wmi |
| c2_beacon_active | int | Whether C2 channel is beaconing |
| sandbox_evaded | int | Whether sandbox evasion succeeded |
| av_detected | int | AV signature detection at this step |
| edr_detected | int | EDR behavioural detection at this step |
| dwell_time_hours | float | Cumulative dwell time |
| lotl_technique_used | string | Living-off-the-Land binary if any |
### `sample_summary.csv` (per-sample outcome)
| Column | Type | Description |
|-----------------------------------|---------|------------------------------------------|
| sample_id, family_id, actor_id | string | Identifiers |
| malware_family | string | Family classification target |
| threat_actor_tier | string | Tier classification target |
| target_platform | string | Platform |
| campaign_success_flag | int | Boolean — successful campaign |
| av_detection_flag | int | Boolean — AV detection ever |
| edr_detection_flag | int | Boolean — EDR detection ever |
| sandbox_evaded_flag | int | Boolean — sandbox evasion ever |
| packer_detected_flag | int | Boolean — packer detected |
| family_attribution_confidence | float | Confidence score (0–1) |
| total_dwell_hours | float | End-to-end dwell |
| lateral_propagation_count | int | Count of lateral spread events |
See `execution_events.csv` and `environment_profiles.csv` for the discrete
event log and endpoint environment schemas respectively.
## Suggested Use Cases
- Training **malware execution-phase classifiers** —
[worked example available](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)
- Training **malware family classifiers** (9-class with realistic class
imbalance and family-specific feature distributions — full dataset
recommended for adequate per-class sample size)
- **Threat actor attribution** modelling (4-tier classification)
- **EDR detection benchmarking** — packed vs unpacked, signature vs
behavioural, fileless vs binary
- **Sandbox evasion detection** with tier-calibrated evasion budgets
- **Polymorphic malware detection** — sample mutation effects on AV
signature coverage
- **C2 beacon detection** with realistic beacon-active timestep patterns
- **PE entropy / packing detection** — entropy distributions tied to
ground-truth packing flags
- **Living-off-the-Land binary detection** for APT-tier samples
## Loading the Data
```python
import pandas as pd
samples = pd.read_csv("malware_samples.csv")
summaries = pd.read_csv("sample_summary.csv")
events = pd.read_csv("execution_events.csv")
environments = pd.read_csv("environment_profiles.csv")
# Join per-timestep telemetry with per-sample summary labels
enriched = samples.merge(summaries, on="sample_id", how="left",
suffixes=("", "_summary"))
# Family classification target
y_family = summaries["malware_family"]
# Threat-actor tier target
y_tier = summaries["threat_actor_tier"]
# Binary detection target (per-timestep)
y_detected = (samples["av_detected"] | samples["edr_detected"]).astype(int)
```
For a worked end-to-end example with execution-phase classification,
group-aware splitting, and feature engineering, see the inference notebook
in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb003-baseline-classifier/blob/main/inference_example.ipynb).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB003 dataset includes **~349,000 rows** across all four files,
with calibrated benchmark validation against 12 metrics drawn from
authoritative AV-testing and threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb003_sample_2026,
title = {CYB003: Synthetic Malware Behaviour & Classification Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb003-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 13:46:05 UTC
- Lifecycle model : Multi-timestep PE + behavioural + outcome simulation
- Overall benchmark : 100.0 / 100 (grade A+)
|