pradeep-xpert commited on
Commit
ecf6a42
·
verified ·
1 Parent(s): 2149d43

Upload folder using huggingface_hub

Browse files
README.md ADDED
@@ -0,0 +1,198 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: cc-by-nc-4.0
3
+ task_categories:
4
+ - tabular-classification
5
+ - time-series-forecasting
6
+ tags:
7
+ - cybersecurity
8
+ - malware
9
+ - malware-classification
10
+ - threat-intelligence
11
+ - apt
12
+ - ransomware
13
+ - synthetic-data
14
+ - edr
15
+ - sandbox-evasion
16
+ - polymorphic
17
+ pretty_name: CYB003 — Synthetic Malware Behaviour & Classification (Sample)
18
+ size_categories:
19
+ - 1K<n<10K
20
+ ---
21
+
22
+ # CYB003 — Synthetic Malware Behaviour & Classification Dataset (Sample)
23
+
24
+ **XpertSystems.ai Synthetic Data Platform · SKU: CYB003-SAMPLE · Version 1.0.0**
25
+
26
+ This is a **free preview** of the full **CYB003 — Synthetic Malware Behaviour
27
+ & Classification Dataset** product. It contains roughly **1 / 56th of the
28
+ full dataset** at identical schema, family/tier distribution, and statistical
29
+ fingerprint, so you can evaluate fit before licensing the full product.
30
+
31
+ | File | Rows (sample) | Rows (full) | Description |
32
+ |----------------------------|---------------|---------------|------------------------------------------------|
33
+ | `environment_profiles.csv` | ~100 | ~3,200 | Endpoint environment configurations |
34
+ | `sample_summary.csv` | ~100 | ~5,600 | Per-sample aggregate KPIs |
35
+ | `execution_events.csv` | ~1,056 | ~60,000 | Discrete malware lifecycle events |
36
+ | `malware_samples.csv` | ~6,000 | ~280,000 | Per-timestep sample telemetry |
37
+
38
+ ## Dataset Summary
39
+
40
+ CYB003 simulates malware execution lifecycles across endpoint protection
41
+ stacks with calibrated detection/evasion outcomes, covering:
42
+
43
+ - **9 malware families**: ransomware, trojan, rootkit, worm, spyware,
44
+ fileless_malware, cryptominer, botnet_agent, dropper
45
+ - **4 threat-actor tiers**: commodity, crimeware, apt, nation_state — with
46
+ per-tier sandbox evasion budgets, LotL (Living-off-the-Land) abuse rates,
47
+ and polymorphic mutation probabilities
48
+ - **Endpoint protection stacks**: legacy AV, NGAV (ML-based), EDR
49
+ - **Static PE features**: entropy, packing detection, section anomalies,
50
+ import hash distributions
51
+ - **Behavioural telemetry**: process injection, persistence mechanisms,
52
+ C2 beacon patterns, lateral spread
53
+ - **Outcome modelling**: AV signature detection, EDR behavioural detection,
54
+ sandbox evasion success, family attribution confidence
55
+
56
+ ## Calibrated Benchmark Targets
57
+
58
+ The full product is calibrated to 12 benchmark metrics drawn from
59
+ authoritative threat intelligence and AV-testing sources (VirusTotal,
60
+ AV-TEST, MITRE ATT&CK Evaluations, Mandiant M-Trends, CrowdStrike GTR,
61
+ Verizon DBIR). The sample preserves the same calibration:
62
+
63
+ | Test | Target | Observed | Verdict |
64
+ |------|--------|----------|---------|
65
+ | av_detection_rate_commodity | 0.6200 | 0.6319 | ✓ PASS |
66
+ | edr_detection_rate_apt | 0.3100 | 0.3096 | ✓ PASS |
67
+ | sandbox_evasion_rate_nation | 0.7200 | 0.7225 | ✓ PASS |
68
+ | lateral_propagation_rate | 0.0950 | 0.1038 | ✓ PASS |
69
+ | pe_entropy_mean_packed | 0.9100 | 0.9100 | ✓ PASS |
70
+ | lotl_abuse_rate_apt | 0.4300 | 0.4300 | ✓ PASS |
71
+ | dwell_time_ratio_apt | 0.3200 | 0.3198 | ✓ PASS |
72
+ | family_attribution_confidence | 0.6800 | 0.6808 | ✓ PASS |
73
+ | c2_detection_rate | 0.5400 | 0.5394 | ✓ PASS |
74
+ | campaign_success_rate | 0.3400 | 0.2900 | ✓ PASS |
75
+ | polymorphic_detection_penalty | 0.2400 | 0.2392 | ✓ PASS |
76
+ | false_negative_rate_fileless | 0.3800 | 0.4203 | ✓ PASS |
77
+
78
+ *Note: some benchmarks (e.g. campaign success rate, lateral propagation)
79
+ require larger sample sizes to converge tightly. The full product passes
80
+ all 12 benchmarks at Grade A- or better.*
81
+
82
+ ## Schema Highlights
83
+
84
+ ### `malware_samples.csv` (primary file, per-timestep telemetry)
85
+
86
+ | Column | Type | Description |
87
+ |------------------------------|---------|----------------------------------------------|
88
+ | sample_id | string | Unique malware sample identifier |
89
+ | family_id | string | Malware family instance ID |
90
+ | actor_id | string | Threat actor ID |
91
+ | timestep | int | Step in malware lifecycle (0–59) |
92
+ | malware_family | string | 1 of 9 families |
93
+ | threat_actor_tier | string | commodity / crimeware / apt / nation_state |
94
+ | target_platform | string | windows / linux / macos / android |
95
+ | ep_stack | string | legacy_av / ngav_ml_based / edr_full |
96
+ | pe_entropy | float | Portable Executable section entropy (0–1) |
97
+ | packer_detected_flag | int | Whether PE packer was detected |
98
+ | process_injection_count | int | Process-injection events at this step |
99
+ | persistence_mechanism | string | registry / scheduled_task / service / wmi |
100
+ | c2_beacon_active | int | Whether C2 channel is beaconing |
101
+ | sandbox_evaded | int | Whether sandbox evasion succeeded |
102
+ | av_detected | int | AV signature detection at this step |
103
+ | edr_detected | int | EDR behavioural detection at this step |
104
+ | dwell_time_hours | float | Cumulative dwell time |
105
+ | lotl_technique_used | string | Living-off-the-Land binary if any |
106
+
107
+ ### `sample_summary.csv` (per-sample outcome)
108
+
109
+ | Column | Type | Description |
110
+ |-----------------------------------|---------|------------------------------------------|
111
+ | sample_id, family_id, actor_id | string | Identifiers |
112
+ | malware_family | string | Family classification target |
113
+ | threat_actor_tier | string | Tier classification target |
114
+ | target_platform | string | Platform |
115
+ | campaign_success_flag | int | Boolean — successful campaign |
116
+ | av_detection_flag | int | Boolean — AV detection ever |
117
+ | edr_detection_flag | int | Boolean — EDR detection ever |
118
+ | sandbox_evaded_flag | int | Boolean — sandbox evasion ever |
119
+ | packer_detected_flag | int | Boolean — packer detected |
120
+ | family_attribution_confidence | float | Confidence score (0–1) |
121
+ | total_dwell_hours | float | End-to-end dwell |
122
+ | lateral_propagation_count | int | Count of lateral spread events |
123
+
124
+ See `execution_events.csv` and `environment_profiles.csv` for the discrete
125
+ event log and endpoint environment schemas respectively.
126
+
127
+ ## Suggested Use Cases
128
+
129
+ - Training **malware family classifiers** (9-class with realistic class
130
+ imbalance and family-specific feature distributions)
131
+ - **Threat actor attribution** modelling (4-tier classification)
132
+ - **EDR detection benchmarking** — packed vs unpacked, signature vs
133
+ behavioural, fileless vs binary
134
+ - **Sandbox evasion detection** with tier-calibrated evasion budgets
135
+ - **Polymorphic malware detection** — sample mutation effects on AV
136
+ signature coverage
137
+ - **C2 beacon detection** with realistic beacon-active timestep patterns
138
+ - **PE entropy / packing detection** — entropy distributions tied to
139
+ ground-truth packing flags
140
+ - **Living-off-the-Land binary detection** for APT-tier samples
141
+
142
+ ## Loading the Data
143
+
144
+ ```python
145
+ import pandas as pd
146
+
147
+ samples = pd.read_csv("malware_samples.csv")
148
+ summaries = pd.read_csv("sample_summary.csv")
149
+ events = pd.read_csv("execution_events.csv")
150
+ environments = pd.read_csv("environment_profiles.csv")
151
+
152
+ # Join per-timestep telemetry with per-sample summary labels
153
+ enriched = samples.merge(summaries, on="sample_id", how="left",
154
+ suffixes=("", "_summary"))
155
+
156
+ # Family classification target
157
+ y_family = summaries["malware_family"]
158
+
159
+ # Threat-actor tier target
160
+ y_tier = summaries["threat_actor_tier"]
161
+
162
+ # Binary detection target (per-timestep)
163
+ y_detected = (samples["av_detected"] | samples["edr_detected"]).astype(int)
164
+ ```
165
+
166
+ ## License
167
+
168
+ This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
169
+ research and evaluation). The **full production dataset** is licensed
170
+ commercially — contact XpertSystems.ai for licensing terms.
171
+
172
+ ## Full Product
173
+
174
+ The full CYB003 dataset includes **~349,000 rows** across all four files,
175
+ with calibrated benchmark validation against 12 metrics drawn from
176
+ authoritative AV-testing and threat intelligence sources.
177
+
178
+ 📧 **pradeep@xpertsystems.ai**
179
+ 🌐 **https://xpertsystems.ai**
180
+
181
+ ## Citation
182
+
183
+ ```bibtex
184
+ @dataset{xpertsystems_cyb003_sample_2026,
185
+ title = {CYB003: Synthetic Malware Behaviour & Classification Dataset (Sample)},
186
+ author = {XpertSystems.ai},
187
+ year = {2026},
188
+ url = {https://huggingface.co/datasets/xpertsystems/cyb003-sample}
189
+ }
190
+ ```
191
+
192
+ ## Generation Details
193
+
194
+ - Generator version : 1.0.0
195
+ - Random seed : 42
196
+ - Generated : 2026-05-16 13:46:05 UTC
197
+ - Lifecycle model : Multi-timestep PE + behavioural + outcome simulation
198
+ - Overall benchmark : 100.0 / 100 (grade A+)
environment_profiles.csv ADDED
@@ -0,0 +1,101 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ profile_id,segment_id,endpoint_os,platform_type,ep_stack,patch_currency_score,user_privilege_level,network_segment_type,sandbox_presence_flag,av_signature_age_days,edr_behavioural_enabled,network_egress_filtered
2
+ EP0000,SEG00000,linux_ubuntu_22,linux,edr_endpoint_detect,0.6879,power_user,soc_management,0,53,1,1
3
+ EP0000,SEG00001,linux_ubuntu_22,linux,edr_endpoint_detect,0.7067,standard_user,cloud_workload,0,20,1,0
4
+ EP0000,SEG00002,linux_ubuntu_22,linux,edr_endpoint_detect,0.6568,local_admin,ot_ics_control,0,34,1,0
5
+ EP0000,SEG00003,linux_ubuntu_22,linux,edr_endpoint_detect,0.4043,local_admin,cloud_workload,0,10,1,1
6
+ EP0000,SEG00004,linux_ubuntu_22,linux,edr_endpoint_detect,0.5174,standard_user,dmz_perimeter,0,58,0,1
7
+ EP0000,SEG00005,linux_ubuntu_22,linux,edr_endpoint_detect,0.7211,domain_admin,endpoint_subnet,0,89,1,1
8
+ EP0000,SEG00006,linux_ubuntu_22,linux,edr_endpoint_detect,0.974,power_user,dmz_perimeter,0,33,1,1
9
+ EP0000,SEG00007,linux_ubuntu_22,linux,edr_endpoint_detect,0.4959,power_user,cloud_workload,0,28,1,1
10
+ EP0000,SEG00008,linux_ubuntu_22,linux,edr_endpoint_detect,0.7267,domain_admin,soc_management,0,24,1,1
11
+ EP0000,SEG00009,linux_ubuntu_22,linux,edr_endpoint_detect,0.7572,standard_user,zero_trust_zone,0,8,1,1
12
+ EP0001,SEG00010,windows_10_enterprise,windows,edr_endpoint_detect,0.7419,local_admin,endpoint_subnet,0,14,0,1
13
+ EP0001,SEG00011,windows_10_enterprise,windows,edr_endpoint_detect,0.8289,standard_user,zero_trust_zone,1,26,1,1
14
+ EP0001,SEG00012,windows_10_enterprise,windows,edr_endpoint_detect,0.7897,local_admin,soc_management,1,24,1,1
15
+ EP0001,SEG00013,windows_10_enterprise,windows,edr_endpoint_detect,0.582,power_user,ot_ics_control,0,38,1,1
16
+ EP0001,SEG00014,windows_10_enterprise,windows,edr_endpoint_detect,0.9319,standard_user,soc_management,0,11,1,1
17
+ EP0001,SEG00015,windows_10_enterprise,windows,edr_endpoint_detect,0.7557,standard_user,cloud_workload,0,19,1,0
18
+ EP0001,SEG00016,windows_10_enterprise,windows,edr_endpoint_detect,0.8857,standard_user,ot_ics_control,0,34,1,1
19
+ EP0001,SEG00017,windows_10_enterprise,windows,edr_endpoint_detect,0.7022,standard_user,ot_ics_control,1,7,1,1
20
+ EP0001,SEG00018,windows_10_enterprise,windows,edr_endpoint_detect,0.7981,standard_user,zero_trust_zone,0,41,1,1
21
+ EP0001,SEG00019,windows_10_enterprise,windows,edr_endpoint_detect,0.9174,standard_user,soc_management,0,38,1,1
22
+ EP0002,SEG00020,windows_11_pro,windows,legacy_av_only,0.6409,standard_user,ot_ics_control,0,32,0,1
23
+ EP0002,SEG00021,windows_11_pro,windows,legacy_av_only,0.8474,standard_user,endpoint_subnet,0,38,0,0
24
+ EP0002,SEG00022,windows_11_pro,windows,legacy_av_only,0.6909,local_admin,dmz_perimeter,0,18,0,1
25
+ EP0002,SEG00023,windows_11_pro,windows,legacy_av_only,0.7945,local_admin,soc_management,0,61,0,1
26
+ EP0002,SEG00024,windows_11_pro,windows,legacy_av_only,0.6691,local_admin,ot_ics_control,0,56,0,0
27
+ EP0002,SEG00025,windows_11_pro,windows,legacy_av_only,0.4522,standard_user,ot_ics_control,0,32,0,1
28
+ EP0002,SEG00026,windows_11_pro,windows,legacy_av_only,0.5832,local_admin,soc_management,1,28,0,0
29
+ EP0002,SEG00027,windows_11_pro,windows,legacy_av_only,0.7093,power_user,endpoint_subnet,0,43,0,1
30
+ EP0002,SEG00028,windows_11_pro,windows,legacy_av_only,0.7467,standard_user,corporate_lan,0,15,0,0
31
+ EP0002,SEG00029,windows_11_pro,windows,legacy_av_only,0.5412,standard_user,cloud_workload,0,38,0,1
32
+ EP0003,SEG00030,windows_11_pro,windows,edr_endpoint_detect,0.7865,power_user,dmz_perimeter,0,32,1,1
33
+ EP0003,SEG00031,windows_11_pro,windows,edr_endpoint_detect,0.6372,standard_user,soc_management,1,19,1,1
34
+ EP0003,SEG00032,windows_11_pro,windows,edr_endpoint_detect,0.6934,power_user,corporate_lan,0,33,1,1
35
+ EP0003,SEG00033,windows_11_pro,windows,edr_endpoint_detect,0.7385,domain_admin,dmz_perimeter,0,60,1,1
36
+ EP0003,SEG00034,windows_11_pro,windows,edr_endpoint_detect,0.7786,standard_user,endpoint_subnet,0,6,1,1
37
+ EP0003,SEG00035,windows_11_pro,windows,edr_endpoint_detect,0.6339,standard_user,endpoint_subnet,0,11,1,1
38
+ EP0003,SEG00036,windows_11_pro,windows,edr_endpoint_detect,0.7419,domain_admin,ot_ics_control,0,21,1,0
39
+ EP0003,SEG00037,windows_11_pro,windows,edr_endpoint_detect,0.8665,power_user,zero_trust_zone,0,38,1,1
40
+ EP0003,SEG00038,windows_11_pro,windows,edr_endpoint_detect,0.8828,standard_user,zero_trust_zone,0,31,1,1
41
+ EP0003,SEG00039,windows_11_pro,windows,edr_endpoint_detect,0.9041,local_admin,corporate_lan,0,38,1,1
42
+ EP0004,SEG00040,macos_ventura,macos,ngav_ml_based,0.5386,local_admin,zero_trust_zone,1,20,1,1
43
+ EP0004,SEG00041,macos_ventura,macos,ngav_ml_based,0.7013,power_user,endpoint_subnet,1,26,1,1
44
+ EP0004,SEG00042,macos_ventura,macos,ngav_ml_based,0.887,power_user,endpoint_subnet,0,49,1,0
45
+ EP0004,SEG00043,macos_ventura,macos,ngav_ml_based,0.6565,standard_user,corporate_lan,0,29,1,1
46
+ EP0004,SEG00044,macos_ventura,macos,ngav_ml_based,0.7937,standard_user,endpoint_subnet,1,35,1,1
47
+ EP0004,SEG00045,macos_ventura,macos,ngav_ml_based,0.7552,power_user,soc_management,0,25,0,1
48
+ EP0004,SEG00046,macos_ventura,macos,ngav_ml_based,0.6478,standard_user,endpoint_subnet,0,17,1,1
49
+ EP0004,SEG00047,macos_ventura,macos,ngav_ml_based,0.7649,power_user,corporate_lan,0,39,1,1
50
+ EP0004,SEG00048,macos_ventura,macos,ngav_ml_based,0.7757,local_admin,ot_ics_control,1,47,1,1
51
+ EP0004,SEG00049,macos_ventura,macos,ngav_ml_based,0.6457,standard_user,zero_trust_zone,0,27,1,1
52
+ EP0005,SEG00050,windows_11_pro,windows,legacy_av_only,0.7159,power_user,soc_management,1,13,0,0
53
+ EP0005,SEG00051,windows_11_pro,windows,legacy_av_only,0.8155,standard_user,corporate_lan,0,36,0,0
54
+ EP0005,SEG00052,windows_11_pro,windows,legacy_av_only,0.6809,local_admin,zero_trust_zone,0,34,0,1
55
+ EP0005,SEG00053,windows_11_pro,windows,legacy_av_only,0.7103,standard_user,zero_trust_zone,0,22,0,1
56
+ EP0005,SEG00054,windows_11_pro,windows,legacy_av_only,0.8066,power_user,dmz_perimeter,0,97,0,1
57
+ EP0005,SEG00055,windows_11_pro,windows,legacy_av_only,0.9149,power_user,soc_management,0,61,0,1
58
+ EP0005,SEG00056,windows_11_pro,windows,legacy_av_only,0.7198,standard_user,cloud_workload,0,33,0,1
59
+ EP0005,SEG00057,windows_11_pro,windows,legacy_av_only,0.8392,power_user,endpoint_subnet,0,34,0,1
60
+ EP0005,SEG00058,windows_11_pro,windows,legacy_av_only,0.5952,local_admin,ot_ics_control,0,61,0,0
61
+ EP0005,SEG00059,windows_11_pro,windows,legacy_av_only,0.566,power_user,soc_management,0,51,0,1
62
+ EP0006,SEG00060,windows_11_pro,windows,av_plus_firewall,0.3458,local_admin,zero_trust_zone,0,24,0,1
63
+ EP0006,SEG00061,windows_11_pro,windows,av_plus_firewall,0.8588,domain_admin,soc_management,1,34,0,0
64
+ EP0006,SEG00062,windows_11_pro,windows,av_plus_firewall,0.6398,standard_user,zero_trust_zone,0,24,0,1
65
+ EP0006,SEG00063,windows_11_pro,windows,av_plus_firewall,0.601,power_user,zero_trust_zone,1,10,0,1
66
+ EP0006,SEG00064,windows_11_pro,windows,av_plus_firewall,0.5506,standard_user,corporate_lan,0,6,0,1
67
+ EP0006,SEG00065,windows_11_pro,windows,av_plus_firewall,0.722,local_admin,dmz_perimeter,0,30,0,1
68
+ EP0006,SEG00066,windows_11_pro,windows,av_plus_firewall,0.7108,power_user,soc_management,1,60,0,1
69
+ EP0006,SEG00067,windows_11_pro,windows,av_plus_firewall,0.8451,standard_user,endpoint_subnet,0,23,0,0
70
+ EP0006,SEG00068,windows_11_pro,windows,av_plus_firewall,0.6441,standard_user,corporate_lan,0,27,0,0
71
+ EP0006,SEG00069,windows_11_pro,windows,av_plus_firewall,0.8095,local_admin,corporate_lan,0,19,0,1
72
+ EP0007,SEG00070,windows_server_2022,windows,av_plus_firewall,0.3908,standard_user,ot_ics_control,0,7,0,1
73
+ EP0007,SEG00071,windows_server_2022,windows,av_plus_firewall,0.732,power_user,endpoint_subnet,0,21,0,0
74
+ EP0007,SEG00072,windows_server_2022,windows,av_plus_firewall,0.6249,standard_user,dmz_perimeter,0,26,0,1
75
+ EP0007,SEG00073,windows_server_2022,windows,av_plus_firewall,0.2915,domain_admin,dmz_perimeter,0,29,0,1
76
+ EP0007,SEG00074,windows_server_2022,windows,av_plus_firewall,0.6047,standard_user,corporate_lan,0,54,0,1
77
+ EP0007,SEG00075,windows_server_2022,windows,av_plus_firewall,0.5656,standard_user,ot_ics_control,0,35,0,0
78
+ EP0007,SEG00076,windows_server_2022,windows,av_plus_firewall,0.6661,local_admin,corporate_lan,0,54,0,1
79
+ EP0007,SEG00077,windows_server_2022,windows,av_plus_firewall,0.8648,domain_admin,endpoint_subnet,1,38,0,1
80
+ EP0007,SEG00078,windows_server_2022,windows,av_plus_firewall,0.9469,standard_user,ot_ics_control,0,36,0,1
81
+ EP0007,SEG00079,windows_server_2022,windows,av_plus_firewall,0.6484,power_user,ot_ics_control,0,40,0,0
82
+ EP0008,SEG00080,windows_10_enterprise,windows,ngav_ml_based,0.6387,local_admin,endpoint_subnet,0,14,0,1
83
+ EP0008,SEG00081,windows_10_enterprise,windows,ngav_ml_based,0.8585,local_admin,ot_ics_control,0,43,1,1
84
+ EP0008,SEG00082,windows_10_enterprise,windows,ngav_ml_based,0.4997,standard_user,soc_management,0,21,1,1
85
+ EP0008,SEG00083,windows_10_enterprise,windows,ngav_ml_based,0.6481,power_user,soc_management,0,21,1,1
86
+ EP0008,SEG00084,windows_10_enterprise,windows,ngav_ml_based,0.8529,local_admin,zero_trust_zone,0,27,0,1
87
+ EP0008,SEG00085,windows_10_enterprise,windows,ngav_ml_based,0.8328,local_admin,soc_management,0,20,1,1
88
+ EP0008,SEG00086,windows_10_enterprise,windows,ngav_ml_based,0.6236,local_admin,ot_ics_control,1,12,1,1
89
+ EP0008,SEG00087,windows_10_enterprise,windows,ngav_ml_based,0.9442,power_user,ot_ics_control,1,26,0,1
90
+ EP0008,SEG00088,windows_10_enterprise,windows,ngav_ml_based,0.469,standard_user,dmz_perimeter,0,22,1,1
91
+ EP0008,SEG00089,windows_10_enterprise,windows,ngav_ml_based,0.4636,domain_admin,endpoint_subnet,0,21,1,1
92
+ EP0009,SEG00090,windows_10_enterprise,windows,av_plus_firewall,0.6697,local_admin,corporate_lan,0,24,0,0
93
+ EP0009,SEG00091,windows_10_enterprise,windows,av_plus_firewall,0.8528,local_admin,zero_trust_zone,1,3,0,1
94
+ EP0009,SEG00092,windows_10_enterprise,windows,av_plus_firewall,0.8987,standard_user,soc_management,0,21,0,1
95
+ EP0009,SEG00093,windows_10_enterprise,windows,av_plus_firewall,0.7061,standard_user,corporate_lan,0,58,0,1
96
+ EP0009,SEG00094,windows_10_enterprise,windows,av_plus_firewall,0.6249,local_admin,soc_management,0,56,0,1
97
+ EP0009,SEG00095,windows_10_enterprise,windows,av_plus_firewall,0.878,standard_user,corporate_lan,1,26,0,1
98
+ EP0009,SEG00096,windows_10_enterprise,windows,av_plus_firewall,0.6884,domain_admin,soc_management,1,26,0,1
99
+ EP0009,SEG00097,windows_10_enterprise,windows,av_plus_firewall,0.6432,standard_user,corporate_lan,0,2,0,1
100
+ EP0009,SEG00098,windows_10_enterprise,windows,av_plus_firewall,0.3956,local_admin,ot_ics_control,0,17,0,1
101
+ EP0009,SEG00099,windows_10_enterprise,windows,av_plus_firewall,0.6064,local_admin,endpoint_subnet,0,40,0,1
execution_events.csv ADDED
The diff for this file is too large to render. See raw diff
 
malware_samples.csv ADDED
The diff for this file is too large to render. See raw diff
 
sample_summary.csv ADDED
@@ -0,0 +1,101 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ sample_id,family_id,threat_actor_id,malware_family,threat_actor_tier,target_platform,campaign_attribution_cluster,obfuscation_complexity_score,total_api_calls,unique_api_calls,registry_mutations_total,files_mutated_count,network_connections_total,lateral_propagation_count,c2_sessions_established,execution_duration_steps,av_detection_flag,edr_detection_flag,sandbox_evasion_success,definitive_detection_flag,privilege_escalated_flag,data_exfiltrated_flag,dwell_time_ratio,family_attribution_confidence,lotl_technique_count,packer_detected_flag,threat_actor_roi_score,coordinated_campaign_flag,campaign_success_flag
2
+ S0000_0000,RAN00000,TA0000,ransomware,commodity,linux_rhel_9,7,0.3459,128,96,14,12,22,1,5,50,0,0,0,0,0,1,0.1688,0.6846,1,1,0.862,1,1
3
+ S0000_0001,BOT00001,TA0000,botnet_agent,commodity,macos_ventura,5,0.3239,210,165,5,12,8,0,0,30,1,1,0,0,1,0,0.1701,0.6652,1,0,0.0,1,0
4
+ S0000_0002,CRY00002,TA0000,cryptominer,apt,windows_10_enterprise,8,0.5115,585,64,11,17,21,0,3,45,0,1,1,1,0,0,0.3159,0.6674,1,1,0.191,1,1
5
+ S0000_0003,SPY00003,TA0000,spyware,apt,windows_server_2022,8,0.7117,434,372,9,11,21,0,2,60,0,1,0,1,1,0,0.3279,0.7068,1,0,0.1459,1,1
6
+ S0000_0004,SPY00004,TA0000,spyware,apt,windows_10_enterprise,8,0.7259,349,224,8,9,19,0,5,47,0,1,0,0,1,0,0.2995,0.678,0,0,0.0,1,0
7
+ S0000_0005,APT00005,TA0000,apt_implant,apt,windows_server_2022,0,1.0,1152,882,21,12,27,2,3,40,0,0,0,0,0,1,0.3088,0.6718,0,0,0.2208,1,1
8
+ S0000_0006,RAN00006,TA0000,ransomware,crimeware,windows_10_enterprise,1,0.4357,413,388,8,15,22,0,3,58,0,0,1,1,1,1,0.2699,0.6845,1,1,0.0,1,0
9
+ S0000_0007,CRY00007,TA0000,cryptominer,crimeware,windows_server_2022,11,0.387,514,363,13,13,19,0,2,55,1,0,0,0,1,1,0.2882,0.7019,0,0,0.0,1,0
10
+ S0000_0008,ROO00008,TA0000,rootkit,commodity,linux_ubuntu_22,2,0.5596,270,60,5,15,20,0,4,49,0,0,0,0,1,0,0.1467,0.7187,0,0,0.0,1,0
11
+ S0000_0009,RAN00009,TA0000,ransomware,commodity,linux_ubuntu_22,4,0.3585,692,258,3,8,11,0,7,28,1,1,0,0,1,0,0.2,0.6773,0,0,0.0,1,0
12
+ S0001_0000,FIL00010,TA0001,fileless_malware,apt,windows_10_enterprise,4,0.9857,651,381,11,11,22,0,4,25,1,0,1,1,0,0,0.2868,0.6965,1,0,0.0,1,0
13
+ S0001_0001,DRO00011,TA0001,dropper,crimeware,android_13,10,0.62,210,125,6,9,22,0,1,30,0,1,1,1,0,0,0.2161,0.66,2,0,0.0,1,0
14
+ S0001_0002,BOT00012,TA0001,botnet_agent,crimeware,windows_10_enterprise,2,0.4712,496,222,9,14,16,0,3,35,0,0,1,1,1,0,0.2587,0.6507,3,1,0.0,1,0
15
+ S0001_0003,BOT00013,TA0001,botnet_agent,apt,windows_10_enterprise,2,0.6177,107,78,14,12,14,0,5,34,0,0,0,0,0,1,0.322,0.6749,4,0,0.0,1,0
16
+ S0001_0004,BOT00014,TA0001,botnet_agent,crimeware,windows_server_2022,5,0.484,502,316,10,8,22,0,4,41,0,1,0,1,0,1,0.253,0.6862,0,1,0.0729,1,1
17
+ S0001_0005,BOT00015,TA0001,botnet_agent,crimeware,windows_11_pro,8,0.4521,268,162,8,17,21,2,5,59,0,0,0,0,0,0,0.245,0.7126,0,0,0.0,1,0
18
+ S0001_0006,FIL00016,TA0001,fileless_malware,crimeware,linux_rhel_9,10,0.6866,500,291,7,12,26,1,3,41,1,1,1,1,1,1,0.2269,0.7202,2,1,0.0,1,0
19
+ S0001_0007,TRO00017,TA0001,trojan,crimeware,linux_rhel_9,2,0.5276,525,348,13,13,15,0,2,56,0,0,0,0,0,0,0.2284,0.6844,1,0,0.0,1,0
20
+ S0001_0008,APT00018,TA0001,apt_implant,commodity,windows_10_enterprise,2,0.5858,537,421,10,14,15,0,2,29,1,0,0,1,1,0,0.1695,0.6806,1,1,0.1495,1,1
21
+ S0001_0009,SPY00019,TA0001,spyware,crimeware,embedded_ot_firmware,4,0.5357,227,191,7,13,19,1,5,56,1,0,0,1,1,0,0.2246,0.6878,1,1,0.0,1,0
22
+ S0002_0000,FIL00020,TA0002,fileless_malware,commodity,windows_10_enterprise,9,0.5981,276,161,5,14,27,0,8,26,0,0,1,0,1,0,0.1616,0.6663,0,0,0.0,1,0
23
+ S0002_0001,WOR00021,TA0002,worm,crimeware,windows_11_pro,1,0.4361,183,166,8,9,23,1,5,29,0,0,0,0,0,0,0.1938,0.6682,3,0,0.0,1,0
24
+ S0002_0002,TRO00022,TA0002,trojan,apt,windows_10_enterprise,0,0.7175,613,253,8,8,17,0,1,44,1,0,1,0,0,0,0.3057,0.6993,3,0,0.3861,1,1
25
+ S0002_0003,DRO00023,TA0002,dropper,commodity,android_13,11,0.4615,436,203,9,8,11,0,2,51,1,1,0,1,1,1,0.1333,0.7015,2,1,0.0,1,0
26
+ S0002_0004,BOT00024,TA0002,botnet_agent,commodity,windows_10_enterprise,6,0.3886,140,40,9,10,17,0,2,32,1,0,0,1,0,0,0.1382,0.6809,0,1,0.106,1,1
27
+ S0002_0005,CRY00025,TA0002,cryptominer,commodity,windows_10_enterprise,4,0.2778,755,376,16,16,15,0,2,36,1,0,1,1,1,1,0.1512,0.7154,0,1,0.0,1,0
28
+ S0002_0006,SPY00026,TA0002,spyware,commodity,windows_11_pro,2,0.3812,607,408,8,11,16,0,2,35,0,0,0,1,0,0,0.1446,0.6843,0,1,0.0,1,0
29
+ S0002_0007,APT00027,TA0002,apt_implant,apt,embedded_ot_firmware,0,1.0,513,439,8,12,15,0,1,29,0,0,0,0,0,0,0.326,0.6673,0,1,0.0,1,0
30
+ S0002_0008,FIL00028,TA0002,fileless_malware,crimeware,macos_ventura,6,0.7491,1050,725,4,13,16,0,2,53,0,0,0,1,1,1,0.2622,0.6845,1,0,0.0,1,0
31
+ S0002_0009,SPY00029,TA0002,spyware,apt,linux_ubuntu_22,2,0.7075,318,101,8,10,17,0,0,53,0,0,0,0,0,0,0.3057,0.7325,6,0,0.0,1,0
32
+ S0003_0000,SPY00030,TA0003,spyware,apt,macos_ventura,3,0.7541,462,130,8,8,15,0,2,48,0,1,0,1,1,0,0.3212,0.674,2,0,0.0,1,0
33
+ S0003_0001,ROO00031,TA0003,rootkit,crimeware,macos_ventura,2,0.694,491,407,9,13,26,0,3,51,0,0,0,0,0,1,0.2089,0.6744,1,1,0.224,1,1
34
+ S0003_0002,RAN00032,TA0003,ransomware,apt,windows_11_pro,1,0.6735,445,174,10,9,23,0,2,25,0,0,1,0,0,0,0.334,0.6687,4,0,0.6522,1,1
35
+ S0003_0003,FIL00033,TA0003,fileless_malware,commodity,windows_10_enterprise,6,0.5865,412,341,9,14,8,0,6,25,0,0,0,0,1,0,0.1454,0.6738,1,0,0.0,1,0
36
+ S0003_0004,APT00034,TA0003,apt_implant,commodity,linux_ubuntu_22,4,0.561,387,241,11,12,25,0,2,40,0,0,0,0,1,1,0.1526,0.6752,0,0,0.1548,1,1
37
+ S0003_0005,RAN00035,TA0003,ransomware,commodity,windows_server_2022,2,0.3323,464,189,6,18,21,0,2,27,1,0,0,0,0,0,0.1269,0.688,1,1,0.0,1,0
38
+ S0003_0006,APT00036,TA0003,apt_implant,apt,windows_11_pro,5,1.0,108,44,10,15,19,2,4,42,0,0,1,0,1,1,0.3212,0.6942,1,1,0.5129,1,1
39
+ S0003_0007,APT00037,TA0003,apt_implant,crimeware,windows_10_enterprise,11,0.831,238,204,10,17,24,1,5,57,0,0,0,0,1,1,0.208,0.6839,1,1,0.0,1,0
40
+ S0003_0008,ROO00038,TA0003,rootkit,commodity,linux_ubuntu_22,6,0.4877,296,77,2,6,16,1,3,31,1,0,0,0,1,0,0.1119,0.7233,1,1,0.0,1,0
41
+ S0003_0009,CRY00039,TA0003,cryptominer,crimeware,windows_10_enterprise,0,0.3622,372,288,7,14,21,0,3,49,0,0,0,0,0,1,0.2554,0.6529,2,1,0.6737,1,1
42
+ S0004_0000,TRO00040,TA0004,trojan,commodity,android_13,10,0.4154,474,269,12,18,16,0,2,45,1,1,0,0,1,1,0.1308,0.703,0,1,0.0,1,0
43
+ S0004_0001,BOT00041,TA0004,botnet_agent,apt,windows_10_enterprise,3,0.5885,420,403,5,9,19,0,2,54,0,0,0,0,1,1,0.3012,0.7056,1,0,0.0,1,0
44
+ S0004_0002,BOT00042,TA0004,botnet_agent,crimeware,windows_10_enterprise,5,0.4603,161,57,10,14,19,0,4,34,1,0,1,0,0,1,0.2392,0.7337,1,0,0.5718,1,1
45
+ S0004_0003,WOR00043,TA0004,worm,crimeware,linux_rhel_9,4,0.4219,1074,1046,9,16,14,1,4,46,1,0,0,0,1,0,0.2251,0.7233,3,1,0.1769,1,1
46
+ S0004_0004,RAN00044,TA0004,ransomware,crimeware,windows_10_enterprise,1,0.4805,334,259,11,6,19,0,5,37,0,1,1,1,0,1,0.2054,0.7133,2,1,0.0,1,0
47
+ S0004_0005,DRO00045,TA0004,dropper,crimeware,windows_10_enterprise,0,0.6297,169,124,7,9,21,1,2,42,0,0,1,0,1,0,0.244,0.6484,1,0,0.0,1,0
48
+ S0004_0006,SPY00046,TA0004,spyware,crimeware,windows_server_2022,1,0.6013,430,288,11,16,19,0,1,38,0,0,1,1,0,0,0.2129,0.7044,0,0,0.1496,1,1
49
+ S0004_0007,APT00047,TA0004,apt_implant,commodity,macos_ventura,4,0.5709,97,54,5,11,21,0,1,29,0,1,0,0,1,0,0.1469,0.6466,0,1,0.1768,1,1
50
+ S0004_0008,CRY00048,TA0004,cryptominer,commodity,windows_10_enterprise,11,0.2781,331,193,9,16,23,1,2,52,0,1,0,1,1,1,0.1509,0.6418,2,0,0.0592,1,1
51
+ S0004_0009,BOT00049,TA0004,botnet_agent,nation_state,windows_10_enterprise,1,0.7961,291,196,5,15,16,1,3,42,0,1,1,1,1,1,0.3724,0.6804,1,0,0.0,1,0
52
+ S0005_0000,BOT00050,TA0005,botnet_agent,nation_state,linux_ubuntu_22,10,0.8129,376,156,9,10,13,0,1,56,0,1,1,1,1,1,0.3762,0.6377,1,1,0.0,1,0
53
+ S0005_0001,TRO00051,TA0005,trojan,apt,embedded_ot_firmware,1,0.6984,542,345,10,13,15,0,3,38,0,0,0,1,0,1,0.3395,0.6388,1,1,0.0,1,0
54
+ S0005_0002,WOR00052,TA0005,worm,commodity,windows_11_pro,10,0.3647,285,133,7,13,17,0,0,60,0,1,0,1,0,0,0.179,0.6761,1,0,0.0,1,0
55
+ S0005_0003,SPY00053,TA0005,spyware,nation_state,windows_10_enterprise,0,0.9224,210,93,12,10,18,0,3,47,0,0,0,0,0,1,0.3647,0.6733,2,1,0.3031,1,1
56
+ S0005_0004,SPY00054,TA0005,spyware,apt,windows_10_enterprise,0,0.7579,413,99,9,12,21,1,1,59,0,1,1,1,1,0,0.3398,0.6692,1,0,0.0,1,0
57
+ S0005_0005,RAN00055,TA0005,ransomware,apt,windows_10_enterprise,8,0.6248,272,170,14,8,21,0,4,45,0,0,0,0,0,0,0.3249,0.635,0,1,0.0,1,0
58
+ S0005_0006,FIL00056,TA0005,fileless_malware,crimeware,windows_10_enterprise,0,0.6918,243,184,3,14,11,0,2,54,0,1,0,1,0,1,0.2292,0.6717,1,0,0.0,1,0
59
+ S0005_0007,TRO00057,TA0005,trojan,commodity,windows_server_2022,1,0.3612,557,535,7,14,17,0,5,50,0,1,0,1,1,0,0.1431,0.7143,0,0,0.0,1,0
60
+ S0005_0008,BOT00058,TA0005,botnet_agent,commodity,windows_10_enterprise,0,0.3419,612,146,5,10,15,1,2,33,0,1,0,1,0,0,0.1638,0.6733,1,0,0.0904,1,1
61
+ S0005_0009,CRY00059,TA0005,cryptominer,nation_state,windows_11_pro,7,0.6489,333,182,5,12,22,0,6,38,0,0,1,0,1,1,0.3687,0.7127,2,0,0.0,1,0
62
+ S0006_0000,DRO00060,TA0006,dropper,crimeware,windows_server_2022,4,0.6161,758,376,10,9,18,0,4,51,1,0,0,0,0,0,0.2137,0.7424,2,0,0.0,1,0
63
+ S0006_0001,BOT00061,TA0006,botnet_agent,commodity,windows_server_2022,11,0.3623,637,421,10,6,22,0,2,53,0,0,0,0,1,1,0.1003,0.7102,2,1,0.0,1,0
64
+ S0006_0002,WOR00062,TA0006,worm,crimeware,windows_10_enterprise,9,0.4036,735,302,9,16,23,1,2,52,0,0,0,1,1,1,0.2653,0.7015,1,1,0.0,1,0
65
+ S0006_0003,DRO00063,TA0006,dropper,crimeware,linux_rhel_9,1,0.6033,800,724,10,15,16,0,3,52,0,0,1,0,1,1,0.1951,0.6915,0,0,0.0,1,0
66
+ S0006_0004,SPY00064,TA0006,spyware,commodity,linux_ubuntu_22,10,0.3967,638,526,7,9,23,1,1,33,0,1,0,1,1,0,0.1913,0.6707,0,1,0.0,1,0
67
+ S0006_0005,WOR00065,TA0006,worm,apt,linux_ubuntu_22,9,0.5611,230,148,9,16,23,2,4,51,0,0,1,1,0,0,0.3317,0.695,0,1,0.0,1,0
68
+ S0006_0006,DRO00066,TA0006,dropper,apt,windows_10_enterprise,8,0.803,303,165,4,10,16,1,2,27,0,0,1,0,1,0,0.3109,0.673,5,0,0.0,1,0
69
+ S0006_0007,WOR00067,TA0006,worm,apt,windows_10_enterprise,6,0.571,594,543,9,15,17,2,4,41,0,0,1,1,0,0,0.3453,0.7284,0,0,0.0,1,0
70
+ S0006_0008,RAN00068,TA0006,ransomware,crimeware,android_13,2,0.4298,352,256,5,7,10,0,2,60,1,1,1,0,1,0,0.2651,0.6911,1,0,0.0234,1,1
71
+ S0006_0009,SPY00069,TA0006,spyware,crimeware,windows_11_pro,2,0.5554,172,100,4,4,17,0,5,38,1,0,1,1,0,0,0.2596,0.6877,1,1,0.0,1,0
72
+ S0007_0000,BOT00070,TA0007,botnet_agent,crimeware,windows_10_enterprise,2,0.4638,461,250,9,10,20,0,6,32,0,1,1,1,0,0,0.219,0.6872,2,0,0.0,1,0
73
+ S0007_0001,TRO00071,TA0007,trojan,crimeware,windows_11_pro,3,0.5438,284,145,11,11,18,1,5,54,1,1,1,1,1,1,0.2378,0.6797,3,1,0.1278,1,1
74
+ S0007_0002,SPY00072,TA0007,spyware,commodity,windows_server_2022,10,0.4044,573,444,5,16,21,0,3,58,0,0,0,1,1,1,0.1388,0.6352,1,0,0.0,1,0
75
+ S0007_0003,TRO00073,TA0007,trojan,crimeware,embedded_ot_firmware,0,0.54,338,75,16,17,30,0,6,59,0,0,1,0,0,0,0.2459,0.7191,2,0,0.0,1,0
76
+ S0007_0004,CRY00074,TA0007,cryptominer,commodity,windows_10_enterprise,9,0.339,1046,789,6,16,32,0,2,24,0,0,0,0,0,0,0.1525,0.6171,1,1,0.7932,1,1
77
+ S0007_0005,SPY00075,TA0007,spyware,crimeware,android_13,5,0.5422,677,370,9,14,22,0,4,45,1,0,1,1,1,1,0.2278,0.6758,0,0,0.0,1,0
78
+ S0007_0006,WOR00076,TA0007,worm,crimeware,windows_10_enterprise,0,0.4443,461,218,10,9,15,0,2,43,1,1,0,0,0,1,0.207,0.6753,2,1,0.0385,1,1
79
+ S0007_0007,ROO00077,TA0007,rootkit,commodity,windows_server_2022,0,0.5724,211,164,7,11,15,0,6,56,0,1,1,1,0,0,0.1714,0.6819,0,1,0.255,1,1
80
+ S0007_0008,FIL00078,TA0007,fileless_malware,commodity,windows_server_2022,10,0.4963,393,297,6,9,9,0,3,44,0,1,0,1,0,0,0.1898,0.6152,1,1,0.0,1,0
81
+ S0007_0009,CRY00079,TA0007,cryptominer,crimeware,windows_10_enterprise,5,0.3677,788,278,11,11,13,1,6,42,0,0,0,0,1,1,0.242,0.7092,2,1,0.0,1,0
82
+ S0008_0000,DRO00080,TA0008,dropper,commodity,windows_10_enterprise,2,0.5215,449,380,14,16,18,0,3,57,0,0,0,0,0,0,0.1622,0.694,0,1,0.0,1,0
83
+ S0008_0001,SPY00081,TA0008,spyware,nation_state,windows_11_pro,3,0.9258,304,159,9,10,18,0,2,53,0,1,1,1,1,1,0.383,0.692,7,0,0.1655,1,1
84
+ S0008_0002,TRO00082,TA0008,trojan,crimeware,embedded_ot_firmware,11,0.531,432,196,5,11,13,0,2,53,0,0,0,0,1,0,0.2801,0.6637,3,1,0.6242,1,1
85
+ S0008_0003,APT00083,TA0008,apt_implant,crimeware,windows_server_2022,6,0.7247,325,179,9,8,15,1,1,60,0,0,0,0,1,1,0.2831,0.706,0,1,0.0,1,0
86
+ S0008_0004,CRY00084,TA0008,cryptominer,crimeware,android_13,1,0.3906,339,251,8,7,20,0,4,41,1,1,0,1,1,0,0.2479,0.6307,2,1,0.1715,1,1
87
+ S0008_0005,BOT00085,TA0008,botnet_agent,commodity,linux_rhel_9,0,0.3674,414,320,13,9,15,0,4,27,1,0,1,1,1,0,0.141,0.7165,0,1,0.0,1,0
88
+ S0008_0006,RAN00086,TA0008,ransomware,nation_state,windows_11_pro,5,0.7548,349,292,6,13,18,1,2,36,1,1,0,0,1,1,0.3538,0.7326,2,1,0.0,1,0
89
+ S0008_0007,WOR00087,TA0008,worm,crimeware,linux_ubuntu_22,2,0.4328,272,218,11,16,17,2,1,52,0,0,1,0,0,0,0.2411,0.7245,0,0,0.0,1,0
90
+ S0008_0008,BOT00088,TA0008,botnet_agent,apt,windows_10_enterprise,1,0.575,763,589,4,9,16,2,3,38,0,0,0,0,0,1,0.3428,0.6743,6,0,0.0,1,0
91
+ S0008_0009,APT00089,TA0008,apt_implant,commodity,windows_10_enterprise,7,0.6262,195,113,8,10,26,1,2,35,0,1,0,1,1,0,0.1649,0.7157,1,0,0.0,1,0
92
+ S0009_0000,SPY00090,TA0009,spyware,crimeware,linux_rhel_9,3,0.6025,356,261,8,11,14,0,3,26,1,0,1,1,0,0,0.2522,0.7032,1,1,0.0,1,0
93
+ S0009_0001,APT00091,TA0009,apt_implant,crimeware,linux_ubuntu_22,11,0.7276,294,214,5,9,23,0,2,32,0,1,0,0,0,0,0.2476,0.589,1,1,0.0,1,0
94
+ S0009_0002,APT00092,TA0009,apt_implant,nation_state,windows_10_enterprise,9,1.0,188,170,10,8,13,2,5,40,0,0,1,0,1,1,0.3345,0.6676,3,1,0.0,1,0
95
+ S0009_0003,WOR00093,TA0009,worm,crimeware,windows_11_pro,8,0.4004,326,203,9,8,17,4,1,27,0,1,1,1,1,0,0.2065,0.7171,1,1,0.0,1,0
96
+ S0009_0004,APT00094,TA0009,apt_implant,crimeware,windows_server_2022,5,0.7797,311,189,10,20,12,0,0,58,0,0,1,1,0,1,0.2068,0.6568,5,0,0.0,1,0
97
+ S0009_0005,ROO00095,TA0009,rootkit,commodity,macos_ventura,7,0.5192,568,171,5,13,18,0,3,37,0,0,0,1,1,0,0.1392,0.6655,3,0,0.1176,1,1
98
+ S0009_0006,ROO00096,TA0009,rootkit,crimeware,windows_server_2022,2,0.6735,1075,880,10,14,10,0,4,42,1,0,0,1,0,1,0.2557,0.6799,0,1,0.0,1,0
99
+ S0009_0007,CRY00097,TA0009,cryptominer,crimeware,windows_11_pro,7,0.4096,404,351,8,13,13,0,2,44,1,0,1,1,1,0,0.2222,0.7118,3,0,0.0,1,0
100
+ S0009_0008,CRY00098,TA0009,cryptominer,crimeware,windows_11_pro,4,0.4154,153,90,18,15,21,0,1,37,0,1,0,1,1,1,0.2262,0.7247,0,0,0.0,1,0
101
+ S0009_0009,TRO00099,TA0009,trojan,commodity,windows_11_pro,3,0.3467,529,394,11,12,24,0,3,57,1,0,1,0,1,1,0.152,0.6584,0,1,0.0,1,0