Upload folder using huggingface_hub
Browse files- README.md +198 -0
- environment_profiles.csv +101 -0
- execution_events.csv +0 -0
- malware_samples.csv +0 -0
- sample_summary.csv +101 -0
README.md
ADDED
|
@@ -0,0 +1,198 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: cc-by-nc-4.0
|
| 3 |
+
task_categories:
|
| 4 |
+
- tabular-classification
|
| 5 |
+
- time-series-forecasting
|
| 6 |
+
tags:
|
| 7 |
+
- cybersecurity
|
| 8 |
+
- malware
|
| 9 |
+
- malware-classification
|
| 10 |
+
- threat-intelligence
|
| 11 |
+
- apt
|
| 12 |
+
- ransomware
|
| 13 |
+
- synthetic-data
|
| 14 |
+
- edr
|
| 15 |
+
- sandbox-evasion
|
| 16 |
+
- polymorphic
|
| 17 |
+
pretty_name: CYB003 — Synthetic Malware Behaviour & Classification (Sample)
|
| 18 |
+
size_categories:
|
| 19 |
+
- 1K<n<10K
|
| 20 |
+
---
|
| 21 |
+
|
| 22 |
+
# CYB003 — Synthetic Malware Behaviour & Classification Dataset (Sample)
|
| 23 |
+
|
| 24 |
+
**XpertSystems.ai Synthetic Data Platform · SKU: CYB003-SAMPLE · Version 1.0.0**
|
| 25 |
+
|
| 26 |
+
This is a **free preview** of the full **CYB003 — Synthetic Malware Behaviour
|
| 27 |
+
& Classification Dataset** product. It contains roughly **1 / 56th of the
|
| 28 |
+
full dataset** at identical schema, family/tier distribution, and statistical
|
| 29 |
+
fingerprint, so you can evaluate fit before licensing the full product.
|
| 30 |
+
|
| 31 |
+
| File | Rows (sample) | Rows (full) | Description |
|
| 32 |
+
|----------------------------|---------------|---------------|------------------------------------------------|
|
| 33 |
+
| `environment_profiles.csv` | ~100 | ~3,200 | Endpoint environment configurations |
|
| 34 |
+
| `sample_summary.csv` | ~100 | ~5,600 | Per-sample aggregate KPIs |
|
| 35 |
+
| `execution_events.csv` | ~1,056 | ~60,000 | Discrete malware lifecycle events |
|
| 36 |
+
| `malware_samples.csv` | ~6,000 | ~280,000 | Per-timestep sample telemetry |
|
| 37 |
+
|
| 38 |
+
## Dataset Summary
|
| 39 |
+
|
| 40 |
+
CYB003 simulates malware execution lifecycles across endpoint protection
|
| 41 |
+
stacks with calibrated detection/evasion outcomes, covering:
|
| 42 |
+
|
| 43 |
+
- **9 malware families**: ransomware, trojan, rootkit, worm, spyware,
|
| 44 |
+
fileless_malware, cryptominer, botnet_agent, dropper
|
| 45 |
+
- **4 threat-actor tiers**: commodity, crimeware, apt, nation_state — with
|
| 46 |
+
per-tier sandbox evasion budgets, LotL (Living-off-the-Land) abuse rates,
|
| 47 |
+
and polymorphic mutation probabilities
|
| 48 |
+
- **Endpoint protection stacks**: legacy AV, NGAV (ML-based), EDR
|
| 49 |
+
- **Static PE features**: entropy, packing detection, section anomalies,
|
| 50 |
+
import hash distributions
|
| 51 |
+
- **Behavioural telemetry**: process injection, persistence mechanisms,
|
| 52 |
+
C2 beacon patterns, lateral spread
|
| 53 |
+
- **Outcome modelling**: AV signature detection, EDR behavioural detection,
|
| 54 |
+
sandbox evasion success, family attribution confidence
|
| 55 |
+
|
| 56 |
+
## Calibrated Benchmark Targets
|
| 57 |
+
|
| 58 |
+
The full product is calibrated to 12 benchmark metrics drawn from
|
| 59 |
+
authoritative threat intelligence and AV-testing sources (VirusTotal,
|
| 60 |
+
AV-TEST, MITRE ATT&CK Evaluations, Mandiant M-Trends, CrowdStrike GTR,
|
| 61 |
+
Verizon DBIR). The sample preserves the same calibration:
|
| 62 |
+
|
| 63 |
+
| Test | Target | Observed | Verdict |
|
| 64 |
+
|------|--------|----------|---------|
|
| 65 |
+
| av_detection_rate_commodity | 0.6200 | 0.6319 | ✓ PASS |
|
| 66 |
+
| edr_detection_rate_apt | 0.3100 | 0.3096 | ✓ PASS |
|
| 67 |
+
| sandbox_evasion_rate_nation | 0.7200 | 0.7225 | ✓ PASS |
|
| 68 |
+
| lateral_propagation_rate | 0.0950 | 0.1038 | ✓ PASS |
|
| 69 |
+
| pe_entropy_mean_packed | 0.9100 | 0.9100 | ✓ PASS |
|
| 70 |
+
| lotl_abuse_rate_apt | 0.4300 | 0.4300 | ✓ PASS |
|
| 71 |
+
| dwell_time_ratio_apt | 0.3200 | 0.3198 | ✓ PASS |
|
| 72 |
+
| family_attribution_confidence | 0.6800 | 0.6808 | ✓ PASS |
|
| 73 |
+
| c2_detection_rate | 0.5400 | 0.5394 | ✓ PASS |
|
| 74 |
+
| campaign_success_rate | 0.3400 | 0.2900 | ✓ PASS |
|
| 75 |
+
| polymorphic_detection_penalty | 0.2400 | 0.2392 | ✓ PASS |
|
| 76 |
+
| false_negative_rate_fileless | 0.3800 | 0.4203 | ✓ PASS |
|
| 77 |
+
|
| 78 |
+
*Note: some benchmarks (e.g. campaign success rate, lateral propagation)
|
| 79 |
+
require larger sample sizes to converge tightly. The full product passes
|
| 80 |
+
all 12 benchmarks at Grade A- or better.*
|
| 81 |
+
|
| 82 |
+
## Schema Highlights
|
| 83 |
+
|
| 84 |
+
### `malware_samples.csv` (primary file, per-timestep telemetry)
|
| 85 |
+
|
| 86 |
+
| Column | Type | Description |
|
| 87 |
+
|------------------------------|---------|----------------------------------------------|
|
| 88 |
+
| sample_id | string | Unique malware sample identifier |
|
| 89 |
+
| family_id | string | Malware family instance ID |
|
| 90 |
+
| actor_id | string | Threat actor ID |
|
| 91 |
+
| timestep | int | Step in malware lifecycle (0–59) |
|
| 92 |
+
| malware_family | string | 1 of 9 families |
|
| 93 |
+
| threat_actor_tier | string | commodity / crimeware / apt / nation_state |
|
| 94 |
+
| target_platform | string | windows / linux / macos / android |
|
| 95 |
+
| ep_stack | string | legacy_av / ngav_ml_based / edr_full |
|
| 96 |
+
| pe_entropy | float | Portable Executable section entropy (0–1) |
|
| 97 |
+
| packer_detected_flag | int | Whether PE packer was detected |
|
| 98 |
+
| process_injection_count | int | Process-injection events at this step |
|
| 99 |
+
| persistence_mechanism | string | registry / scheduled_task / service / wmi |
|
| 100 |
+
| c2_beacon_active | int | Whether C2 channel is beaconing |
|
| 101 |
+
| sandbox_evaded | int | Whether sandbox evasion succeeded |
|
| 102 |
+
| av_detected | int | AV signature detection at this step |
|
| 103 |
+
| edr_detected | int | EDR behavioural detection at this step |
|
| 104 |
+
| dwell_time_hours | float | Cumulative dwell time |
|
| 105 |
+
| lotl_technique_used | string | Living-off-the-Land binary if any |
|
| 106 |
+
|
| 107 |
+
### `sample_summary.csv` (per-sample outcome)
|
| 108 |
+
|
| 109 |
+
| Column | Type | Description |
|
| 110 |
+
|-----------------------------------|---------|------------------------------------------|
|
| 111 |
+
| sample_id, family_id, actor_id | string | Identifiers |
|
| 112 |
+
| malware_family | string | Family classification target |
|
| 113 |
+
| threat_actor_tier | string | Tier classification target |
|
| 114 |
+
| target_platform | string | Platform |
|
| 115 |
+
| campaign_success_flag | int | Boolean — successful campaign |
|
| 116 |
+
| av_detection_flag | int | Boolean — AV detection ever |
|
| 117 |
+
| edr_detection_flag | int | Boolean — EDR detection ever |
|
| 118 |
+
| sandbox_evaded_flag | int | Boolean — sandbox evasion ever |
|
| 119 |
+
| packer_detected_flag | int | Boolean — packer detected |
|
| 120 |
+
| family_attribution_confidence | float | Confidence score (0–1) |
|
| 121 |
+
| total_dwell_hours | float | End-to-end dwell |
|
| 122 |
+
| lateral_propagation_count | int | Count of lateral spread events |
|
| 123 |
+
|
| 124 |
+
See `execution_events.csv` and `environment_profiles.csv` for the discrete
|
| 125 |
+
event log and endpoint environment schemas respectively.
|
| 126 |
+
|
| 127 |
+
## Suggested Use Cases
|
| 128 |
+
|
| 129 |
+
- Training **malware family classifiers** (9-class with realistic class
|
| 130 |
+
imbalance and family-specific feature distributions)
|
| 131 |
+
- **Threat actor attribution** modelling (4-tier classification)
|
| 132 |
+
- **EDR detection benchmarking** — packed vs unpacked, signature vs
|
| 133 |
+
behavioural, fileless vs binary
|
| 134 |
+
- **Sandbox evasion detection** with tier-calibrated evasion budgets
|
| 135 |
+
- **Polymorphic malware detection** — sample mutation effects on AV
|
| 136 |
+
signature coverage
|
| 137 |
+
- **C2 beacon detection** with realistic beacon-active timestep patterns
|
| 138 |
+
- **PE entropy / packing detection** — entropy distributions tied to
|
| 139 |
+
ground-truth packing flags
|
| 140 |
+
- **Living-off-the-Land binary detection** for APT-tier samples
|
| 141 |
+
|
| 142 |
+
## Loading the Data
|
| 143 |
+
|
| 144 |
+
```python
|
| 145 |
+
import pandas as pd
|
| 146 |
+
|
| 147 |
+
samples = pd.read_csv("malware_samples.csv")
|
| 148 |
+
summaries = pd.read_csv("sample_summary.csv")
|
| 149 |
+
events = pd.read_csv("execution_events.csv")
|
| 150 |
+
environments = pd.read_csv("environment_profiles.csv")
|
| 151 |
+
|
| 152 |
+
# Join per-timestep telemetry with per-sample summary labels
|
| 153 |
+
enriched = samples.merge(summaries, on="sample_id", how="left",
|
| 154 |
+
suffixes=("", "_summary"))
|
| 155 |
+
|
| 156 |
+
# Family classification target
|
| 157 |
+
y_family = summaries["malware_family"]
|
| 158 |
+
|
| 159 |
+
# Threat-actor tier target
|
| 160 |
+
y_tier = summaries["threat_actor_tier"]
|
| 161 |
+
|
| 162 |
+
# Binary detection target (per-timestep)
|
| 163 |
+
y_detected = (samples["av_detected"] | samples["edr_detected"]).astype(int)
|
| 164 |
+
```
|
| 165 |
+
|
| 166 |
+
## License
|
| 167 |
+
|
| 168 |
+
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|
| 169 |
+
research and evaluation). The **full production dataset** is licensed
|
| 170 |
+
commercially — contact XpertSystems.ai for licensing terms.
|
| 171 |
+
|
| 172 |
+
## Full Product
|
| 173 |
+
|
| 174 |
+
The full CYB003 dataset includes **~349,000 rows** across all four files,
|
| 175 |
+
with calibrated benchmark validation against 12 metrics drawn from
|
| 176 |
+
authoritative AV-testing and threat intelligence sources.
|
| 177 |
+
|
| 178 |
+
📧 **pradeep@xpertsystems.ai**
|
| 179 |
+
🌐 **https://xpertsystems.ai**
|
| 180 |
+
|
| 181 |
+
## Citation
|
| 182 |
+
|
| 183 |
+
```bibtex
|
| 184 |
+
@dataset{xpertsystems_cyb003_sample_2026,
|
| 185 |
+
title = {CYB003: Synthetic Malware Behaviour & Classification Dataset (Sample)},
|
| 186 |
+
author = {XpertSystems.ai},
|
| 187 |
+
year = {2026},
|
| 188 |
+
url = {https://huggingface.co/datasets/xpertsystems/cyb003-sample}
|
| 189 |
+
}
|
| 190 |
+
```
|
| 191 |
+
|
| 192 |
+
## Generation Details
|
| 193 |
+
|
| 194 |
+
- Generator version : 1.0.0
|
| 195 |
+
- Random seed : 42
|
| 196 |
+
- Generated : 2026-05-16 13:46:05 UTC
|
| 197 |
+
- Lifecycle model : Multi-timestep PE + behavioural + outcome simulation
|
| 198 |
+
- Overall benchmark : 100.0 / 100 (grade A+)
|
environment_profiles.csv
ADDED
|
@@ -0,0 +1,101 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
profile_id,segment_id,endpoint_os,platform_type,ep_stack,patch_currency_score,user_privilege_level,network_segment_type,sandbox_presence_flag,av_signature_age_days,edr_behavioural_enabled,network_egress_filtered
|
| 2 |
+
EP0000,SEG00000,linux_ubuntu_22,linux,edr_endpoint_detect,0.6879,power_user,soc_management,0,53,1,1
|
| 3 |
+
EP0000,SEG00001,linux_ubuntu_22,linux,edr_endpoint_detect,0.7067,standard_user,cloud_workload,0,20,1,0
|
| 4 |
+
EP0000,SEG00002,linux_ubuntu_22,linux,edr_endpoint_detect,0.6568,local_admin,ot_ics_control,0,34,1,0
|
| 5 |
+
EP0000,SEG00003,linux_ubuntu_22,linux,edr_endpoint_detect,0.4043,local_admin,cloud_workload,0,10,1,1
|
| 6 |
+
EP0000,SEG00004,linux_ubuntu_22,linux,edr_endpoint_detect,0.5174,standard_user,dmz_perimeter,0,58,0,1
|
| 7 |
+
EP0000,SEG00005,linux_ubuntu_22,linux,edr_endpoint_detect,0.7211,domain_admin,endpoint_subnet,0,89,1,1
|
| 8 |
+
EP0000,SEG00006,linux_ubuntu_22,linux,edr_endpoint_detect,0.974,power_user,dmz_perimeter,0,33,1,1
|
| 9 |
+
EP0000,SEG00007,linux_ubuntu_22,linux,edr_endpoint_detect,0.4959,power_user,cloud_workload,0,28,1,1
|
| 10 |
+
EP0000,SEG00008,linux_ubuntu_22,linux,edr_endpoint_detect,0.7267,domain_admin,soc_management,0,24,1,1
|
| 11 |
+
EP0000,SEG00009,linux_ubuntu_22,linux,edr_endpoint_detect,0.7572,standard_user,zero_trust_zone,0,8,1,1
|
| 12 |
+
EP0001,SEG00010,windows_10_enterprise,windows,edr_endpoint_detect,0.7419,local_admin,endpoint_subnet,0,14,0,1
|
| 13 |
+
EP0001,SEG00011,windows_10_enterprise,windows,edr_endpoint_detect,0.8289,standard_user,zero_trust_zone,1,26,1,1
|
| 14 |
+
EP0001,SEG00012,windows_10_enterprise,windows,edr_endpoint_detect,0.7897,local_admin,soc_management,1,24,1,1
|
| 15 |
+
EP0001,SEG00013,windows_10_enterprise,windows,edr_endpoint_detect,0.582,power_user,ot_ics_control,0,38,1,1
|
| 16 |
+
EP0001,SEG00014,windows_10_enterprise,windows,edr_endpoint_detect,0.9319,standard_user,soc_management,0,11,1,1
|
| 17 |
+
EP0001,SEG00015,windows_10_enterprise,windows,edr_endpoint_detect,0.7557,standard_user,cloud_workload,0,19,1,0
|
| 18 |
+
EP0001,SEG00016,windows_10_enterprise,windows,edr_endpoint_detect,0.8857,standard_user,ot_ics_control,0,34,1,1
|
| 19 |
+
EP0001,SEG00017,windows_10_enterprise,windows,edr_endpoint_detect,0.7022,standard_user,ot_ics_control,1,7,1,1
|
| 20 |
+
EP0001,SEG00018,windows_10_enterprise,windows,edr_endpoint_detect,0.7981,standard_user,zero_trust_zone,0,41,1,1
|
| 21 |
+
EP0001,SEG00019,windows_10_enterprise,windows,edr_endpoint_detect,0.9174,standard_user,soc_management,0,38,1,1
|
| 22 |
+
EP0002,SEG00020,windows_11_pro,windows,legacy_av_only,0.6409,standard_user,ot_ics_control,0,32,0,1
|
| 23 |
+
EP0002,SEG00021,windows_11_pro,windows,legacy_av_only,0.8474,standard_user,endpoint_subnet,0,38,0,0
|
| 24 |
+
EP0002,SEG00022,windows_11_pro,windows,legacy_av_only,0.6909,local_admin,dmz_perimeter,0,18,0,1
|
| 25 |
+
EP0002,SEG00023,windows_11_pro,windows,legacy_av_only,0.7945,local_admin,soc_management,0,61,0,1
|
| 26 |
+
EP0002,SEG00024,windows_11_pro,windows,legacy_av_only,0.6691,local_admin,ot_ics_control,0,56,0,0
|
| 27 |
+
EP0002,SEG00025,windows_11_pro,windows,legacy_av_only,0.4522,standard_user,ot_ics_control,0,32,0,1
|
| 28 |
+
EP0002,SEG00026,windows_11_pro,windows,legacy_av_only,0.5832,local_admin,soc_management,1,28,0,0
|
| 29 |
+
EP0002,SEG00027,windows_11_pro,windows,legacy_av_only,0.7093,power_user,endpoint_subnet,0,43,0,1
|
| 30 |
+
EP0002,SEG00028,windows_11_pro,windows,legacy_av_only,0.7467,standard_user,corporate_lan,0,15,0,0
|
| 31 |
+
EP0002,SEG00029,windows_11_pro,windows,legacy_av_only,0.5412,standard_user,cloud_workload,0,38,0,1
|
| 32 |
+
EP0003,SEG00030,windows_11_pro,windows,edr_endpoint_detect,0.7865,power_user,dmz_perimeter,0,32,1,1
|
| 33 |
+
EP0003,SEG00031,windows_11_pro,windows,edr_endpoint_detect,0.6372,standard_user,soc_management,1,19,1,1
|
| 34 |
+
EP0003,SEG00032,windows_11_pro,windows,edr_endpoint_detect,0.6934,power_user,corporate_lan,0,33,1,1
|
| 35 |
+
EP0003,SEG00033,windows_11_pro,windows,edr_endpoint_detect,0.7385,domain_admin,dmz_perimeter,0,60,1,1
|
| 36 |
+
EP0003,SEG00034,windows_11_pro,windows,edr_endpoint_detect,0.7786,standard_user,endpoint_subnet,0,6,1,1
|
| 37 |
+
EP0003,SEG00035,windows_11_pro,windows,edr_endpoint_detect,0.6339,standard_user,endpoint_subnet,0,11,1,1
|
| 38 |
+
EP0003,SEG00036,windows_11_pro,windows,edr_endpoint_detect,0.7419,domain_admin,ot_ics_control,0,21,1,0
|
| 39 |
+
EP0003,SEG00037,windows_11_pro,windows,edr_endpoint_detect,0.8665,power_user,zero_trust_zone,0,38,1,1
|
| 40 |
+
EP0003,SEG00038,windows_11_pro,windows,edr_endpoint_detect,0.8828,standard_user,zero_trust_zone,0,31,1,1
|
| 41 |
+
EP0003,SEG00039,windows_11_pro,windows,edr_endpoint_detect,0.9041,local_admin,corporate_lan,0,38,1,1
|
| 42 |
+
EP0004,SEG00040,macos_ventura,macos,ngav_ml_based,0.5386,local_admin,zero_trust_zone,1,20,1,1
|
| 43 |
+
EP0004,SEG00041,macos_ventura,macos,ngav_ml_based,0.7013,power_user,endpoint_subnet,1,26,1,1
|
| 44 |
+
EP0004,SEG00042,macos_ventura,macos,ngav_ml_based,0.887,power_user,endpoint_subnet,0,49,1,0
|
| 45 |
+
EP0004,SEG00043,macos_ventura,macos,ngav_ml_based,0.6565,standard_user,corporate_lan,0,29,1,1
|
| 46 |
+
EP0004,SEG00044,macos_ventura,macos,ngav_ml_based,0.7937,standard_user,endpoint_subnet,1,35,1,1
|
| 47 |
+
EP0004,SEG00045,macos_ventura,macos,ngav_ml_based,0.7552,power_user,soc_management,0,25,0,1
|
| 48 |
+
EP0004,SEG00046,macos_ventura,macos,ngav_ml_based,0.6478,standard_user,endpoint_subnet,0,17,1,1
|
| 49 |
+
EP0004,SEG00047,macos_ventura,macos,ngav_ml_based,0.7649,power_user,corporate_lan,0,39,1,1
|
| 50 |
+
EP0004,SEG00048,macos_ventura,macos,ngav_ml_based,0.7757,local_admin,ot_ics_control,1,47,1,1
|
| 51 |
+
EP0004,SEG00049,macos_ventura,macos,ngav_ml_based,0.6457,standard_user,zero_trust_zone,0,27,1,1
|
| 52 |
+
EP0005,SEG00050,windows_11_pro,windows,legacy_av_only,0.7159,power_user,soc_management,1,13,0,0
|
| 53 |
+
EP0005,SEG00051,windows_11_pro,windows,legacy_av_only,0.8155,standard_user,corporate_lan,0,36,0,0
|
| 54 |
+
EP0005,SEG00052,windows_11_pro,windows,legacy_av_only,0.6809,local_admin,zero_trust_zone,0,34,0,1
|
| 55 |
+
EP0005,SEG00053,windows_11_pro,windows,legacy_av_only,0.7103,standard_user,zero_trust_zone,0,22,0,1
|
| 56 |
+
EP0005,SEG00054,windows_11_pro,windows,legacy_av_only,0.8066,power_user,dmz_perimeter,0,97,0,1
|
| 57 |
+
EP0005,SEG00055,windows_11_pro,windows,legacy_av_only,0.9149,power_user,soc_management,0,61,0,1
|
| 58 |
+
EP0005,SEG00056,windows_11_pro,windows,legacy_av_only,0.7198,standard_user,cloud_workload,0,33,0,1
|
| 59 |
+
EP0005,SEG00057,windows_11_pro,windows,legacy_av_only,0.8392,power_user,endpoint_subnet,0,34,0,1
|
| 60 |
+
EP0005,SEG00058,windows_11_pro,windows,legacy_av_only,0.5952,local_admin,ot_ics_control,0,61,0,0
|
| 61 |
+
EP0005,SEG00059,windows_11_pro,windows,legacy_av_only,0.566,power_user,soc_management,0,51,0,1
|
| 62 |
+
EP0006,SEG00060,windows_11_pro,windows,av_plus_firewall,0.3458,local_admin,zero_trust_zone,0,24,0,1
|
| 63 |
+
EP0006,SEG00061,windows_11_pro,windows,av_plus_firewall,0.8588,domain_admin,soc_management,1,34,0,0
|
| 64 |
+
EP0006,SEG00062,windows_11_pro,windows,av_plus_firewall,0.6398,standard_user,zero_trust_zone,0,24,0,1
|
| 65 |
+
EP0006,SEG00063,windows_11_pro,windows,av_plus_firewall,0.601,power_user,zero_trust_zone,1,10,0,1
|
| 66 |
+
EP0006,SEG00064,windows_11_pro,windows,av_plus_firewall,0.5506,standard_user,corporate_lan,0,6,0,1
|
| 67 |
+
EP0006,SEG00065,windows_11_pro,windows,av_plus_firewall,0.722,local_admin,dmz_perimeter,0,30,0,1
|
| 68 |
+
EP0006,SEG00066,windows_11_pro,windows,av_plus_firewall,0.7108,power_user,soc_management,1,60,0,1
|
| 69 |
+
EP0006,SEG00067,windows_11_pro,windows,av_plus_firewall,0.8451,standard_user,endpoint_subnet,0,23,0,0
|
| 70 |
+
EP0006,SEG00068,windows_11_pro,windows,av_plus_firewall,0.6441,standard_user,corporate_lan,0,27,0,0
|
| 71 |
+
EP0006,SEG00069,windows_11_pro,windows,av_plus_firewall,0.8095,local_admin,corporate_lan,0,19,0,1
|
| 72 |
+
EP0007,SEG00070,windows_server_2022,windows,av_plus_firewall,0.3908,standard_user,ot_ics_control,0,7,0,1
|
| 73 |
+
EP0007,SEG00071,windows_server_2022,windows,av_plus_firewall,0.732,power_user,endpoint_subnet,0,21,0,0
|
| 74 |
+
EP0007,SEG00072,windows_server_2022,windows,av_plus_firewall,0.6249,standard_user,dmz_perimeter,0,26,0,1
|
| 75 |
+
EP0007,SEG00073,windows_server_2022,windows,av_plus_firewall,0.2915,domain_admin,dmz_perimeter,0,29,0,1
|
| 76 |
+
EP0007,SEG00074,windows_server_2022,windows,av_plus_firewall,0.6047,standard_user,corporate_lan,0,54,0,1
|
| 77 |
+
EP0007,SEG00075,windows_server_2022,windows,av_plus_firewall,0.5656,standard_user,ot_ics_control,0,35,0,0
|
| 78 |
+
EP0007,SEG00076,windows_server_2022,windows,av_plus_firewall,0.6661,local_admin,corporate_lan,0,54,0,1
|
| 79 |
+
EP0007,SEG00077,windows_server_2022,windows,av_plus_firewall,0.8648,domain_admin,endpoint_subnet,1,38,0,1
|
| 80 |
+
EP0007,SEG00078,windows_server_2022,windows,av_plus_firewall,0.9469,standard_user,ot_ics_control,0,36,0,1
|
| 81 |
+
EP0007,SEG00079,windows_server_2022,windows,av_plus_firewall,0.6484,power_user,ot_ics_control,0,40,0,0
|
| 82 |
+
EP0008,SEG00080,windows_10_enterprise,windows,ngav_ml_based,0.6387,local_admin,endpoint_subnet,0,14,0,1
|
| 83 |
+
EP0008,SEG00081,windows_10_enterprise,windows,ngav_ml_based,0.8585,local_admin,ot_ics_control,0,43,1,1
|
| 84 |
+
EP0008,SEG00082,windows_10_enterprise,windows,ngav_ml_based,0.4997,standard_user,soc_management,0,21,1,1
|
| 85 |
+
EP0008,SEG00083,windows_10_enterprise,windows,ngav_ml_based,0.6481,power_user,soc_management,0,21,1,1
|
| 86 |
+
EP0008,SEG00084,windows_10_enterprise,windows,ngav_ml_based,0.8529,local_admin,zero_trust_zone,0,27,0,1
|
| 87 |
+
EP0008,SEG00085,windows_10_enterprise,windows,ngav_ml_based,0.8328,local_admin,soc_management,0,20,1,1
|
| 88 |
+
EP0008,SEG00086,windows_10_enterprise,windows,ngav_ml_based,0.6236,local_admin,ot_ics_control,1,12,1,1
|
| 89 |
+
EP0008,SEG00087,windows_10_enterprise,windows,ngav_ml_based,0.9442,power_user,ot_ics_control,1,26,0,1
|
| 90 |
+
EP0008,SEG00088,windows_10_enterprise,windows,ngav_ml_based,0.469,standard_user,dmz_perimeter,0,22,1,1
|
| 91 |
+
EP0008,SEG00089,windows_10_enterprise,windows,ngav_ml_based,0.4636,domain_admin,endpoint_subnet,0,21,1,1
|
| 92 |
+
EP0009,SEG00090,windows_10_enterprise,windows,av_plus_firewall,0.6697,local_admin,corporate_lan,0,24,0,0
|
| 93 |
+
EP0009,SEG00091,windows_10_enterprise,windows,av_plus_firewall,0.8528,local_admin,zero_trust_zone,1,3,0,1
|
| 94 |
+
EP0009,SEG00092,windows_10_enterprise,windows,av_plus_firewall,0.8987,standard_user,soc_management,0,21,0,1
|
| 95 |
+
EP0009,SEG00093,windows_10_enterprise,windows,av_plus_firewall,0.7061,standard_user,corporate_lan,0,58,0,1
|
| 96 |
+
EP0009,SEG00094,windows_10_enterprise,windows,av_plus_firewall,0.6249,local_admin,soc_management,0,56,0,1
|
| 97 |
+
EP0009,SEG00095,windows_10_enterprise,windows,av_plus_firewall,0.878,standard_user,corporate_lan,1,26,0,1
|
| 98 |
+
EP0009,SEG00096,windows_10_enterprise,windows,av_plus_firewall,0.6884,domain_admin,soc_management,1,26,0,1
|
| 99 |
+
EP0009,SEG00097,windows_10_enterprise,windows,av_plus_firewall,0.6432,standard_user,corporate_lan,0,2,0,1
|
| 100 |
+
EP0009,SEG00098,windows_10_enterprise,windows,av_plus_firewall,0.3956,local_admin,ot_ics_control,0,17,0,1
|
| 101 |
+
EP0009,SEG00099,windows_10_enterprise,windows,av_plus_firewall,0.6064,local_admin,endpoint_subnet,0,40,0,1
|
execution_events.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
malware_samples.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
sample_summary.csv
ADDED
|
@@ -0,0 +1,101 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
sample_id,family_id,threat_actor_id,malware_family,threat_actor_tier,target_platform,campaign_attribution_cluster,obfuscation_complexity_score,total_api_calls,unique_api_calls,registry_mutations_total,files_mutated_count,network_connections_total,lateral_propagation_count,c2_sessions_established,execution_duration_steps,av_detection_flag,edr_detection_flag,sandbox_evasion_success,definitive_detection_flag,privilege_escalated_flag,data_exfiltrated_flag,dwell_time_ratio,family_attribution_confidence,lotl_technique_count,packer_detected_flag,threat_actor_roi_score,coordinated_campaign_flag,campaign_success_flag
|
| 2 |
+
S0000_0000,RAN00000,TA0000,ransomware,commodity,linux_rhel_9,7,0.3459,128,96,14,12,22,1,5,50,0,0,0,0,0,1,0.1688,0.6846,1,1,0.862,1,1
|
| 3 |
+
S0000_0001,BOT00001,TA0000,botnet_agent,commodity,macos_ventura,5,0.3239,210,165,5,12,8,0,0,30,1,1,0,0,1,0,0.1701,0.6652,1,0,0.0,1,0
|
| 4 |
+
S0000_0002,CRY00002,TA0000,cryptominer,apt,windows_10_enterprise,8,0.5115,585,64,11,17,21,0,3,45,0,1,1,1,0,0,0.3159,0.6674,1,1,0.191,1,1
|
| 5 |
+
S0000_0003,SPY00003,TA0000,spyware,apt,windows_server_2022,8,0.7117,434,372,9,11,21,0,2,60,0,1,0,1,1,0,0.3279,0.7068,1,0,0.1459,1,1
|
| 6 |
+
S0000_0004,SPY00004,TA0000,spyware,apt,windows_10_enterprise,8,0.7259,349,224,8,9,19,0,5,47,0,1,0,0,1,0,0.2995,0.678,0,0,0.0,1,0
|
| 7 |
+
S0000_0005,APT00005,TA0000,apt_implant,apt,windows_server_2022,0,1.0,1152,882,21,12,27,2,3,40,0,0,0,0,0,1,0.3088,0.6718,0,0,0.2208,1,1
|
| 8 |
+
S0000_0006,RAN00006,TA0000,ransomware,crimeware,windows_10_enterprise,1,0.4357,413,388,8,15,22,0,3,58,0,0,1,1,1,1,0.2699,0.6845,1,1,0.0,1,0
|
| 9 |
+
S0000_0007,CRY00007,TA0000,cryptominer,crimeware,windows_server_2022,11,0.387,514,363,13,13,19,0,2,55,1,0,0,0,1,1,0.2882,0.7019,0,0,0.0,1,0
|
| 10 |
+
S0000_0008,ROO00008,TA0000,rootkit,commodity,linux_ubuntu_22,2,0.5596,270,60,5,15,20,0,4,49,0,0,0,0,1,0,0.1467,0.7187,0,0,0.0,1,0
|
| 11 |
+
S0000_0009,RAN00009,TA0000,ransomware,commodity,linux_ubuntu_22,4,0.3585,692,258,3,8,11,0,7,28,1,1,0,0,1,0,0.2,0.6773,0,0,0.0,1,0
|
| 12 |
+
S0001_0000,FIL00010,TA0001,fileless_malware,apt,windows_10_enterprise,4,0.9857,651,381,11,11,22,0,4,25,1,0,1,1,0,0,0.2868,0.6965,1,0,0.0,1,0
|
| 13 |
+
S0001_0001,DRO00011,TA0001,dropper,crimeware,android_13,10,0.62,210,125,6,9,22,0,1,30,0,1,1,1,0,0,0.2161,0.66,2,0,0.0,1,0
|
| 14 |
+
S0001_0002,BOT00012,TA0001,botnet_agent,crimeware,windows_10_enterprise,2,0.4712,496,222,9,14,16,0,3,35,0,0,1,1,1,0,0.2587,0.6507,3,1,0.0,1,0
|
| 15 |
+
S0001_0003,BOT00013,TA0001,botnet_agent,apt,windows_10_enterprise,2,0.6177,107,78,14,12,14,0,5,34,0,0,0,0,0,1,0.322,0.6749,4,0,0.0,1,0
|
| 16 |
+
S0001_0004,BOT00014,TA0001,botnet_agent,crimeware,windows_server_2022,5,0.484,502,316,10,8,22,0,4,41,0,1,0,1,0,1,0.253,0.6862,0,1,0.0729,1,1
|
| 17 |
+
S0001_0005,BOT00015,TA0001,botnet_agent,crimeware,windows_11_pro,8,0.4521,268,162,8,17,21,2,5,59,0,0,0,0,0,0,0.245,0.7126,0,0,0.0,1,0
|
| 18 |
+
S0001_0006,FIL00016,TA0001,fileless_malware,crimeware,linux_rhel_9,10,0.6866,500,291,7,12,26,1,3,41,1,1,1,1,1,1,0.2269,0.7202,2,1,0.0,1,0
|
| 19 |
+
S0001_0007,TRO00017,TA0001,trojan,crimeware,linux_rhel_9,2,0.5276,525,348,13,13,15,0,2,56,0,0,0,0,0,0,0.2284,0.6844,1,0,0.0,1,0
|
| 20 |
+
S0001_0008,APT00018,TA0001,apt_implant,commodity,windows_10_enterprise,2,0.5858,537,421,10,14,15,0,2,29,1,0,0,1,1,0,0.1695,0.6806,1,1,0.1495,1,1
|
| 21 |
+
S0001_0009,SPY00019,TA0001,spyware,crimeware,embedded_ot_firmware,4,0.5357,227,191,7,13,19,1,5,56,1,0,0,1,1,0,0.2246,0.6878,1,1,0.0,1,0
|
| 22 |
+
S0002_0000,FIL00020,TA0002,fileless_malware,commodity,windows_10_enterprise,9,0.5981,276,161,5,14,27,0,8,26,0,0,1,0,1,0,0.1616,0.6663,0,0,0.0,1,0
|
| 23 |
+
S0002_0001,WOR00021,TA0002,worm,crimeware,windows_11_pro,1,0.4361,183,166,8,9,23,1,5,29,0,0,0,0,0,0,0.1938,0.6682,3,0,0.0,1,0
|
| 24 |
+
S0002_0002,TRO00022,TA0002,trojan,apt,windows_10_enterprise,0,0.7175,613,253,8,8,17,0,1,44,1,0,1,0,0,0,0.3057,0.6993,3,0,0.3861,1,1
|
| 25 |
+
S0002_0003,DRO00023,TA0002,dropper,commodity,android_13,11,0.4615,436,203,9,8,11,0,2,51,1,1,0,1,1,1,0.1333,0.7015,2,1,0.0,1,0
|
| 26 |
+
S0002_0004,BOT00024,TA0002,botnet_agent,commodity,windows_10_enterprise,6,0.3886,140,40,9,10,17,0,2,32,1,0,0,1,0,0,0.1382,0.6809,0,1,0.106,1,1
|
| 27 |
+
S0002_0005,CRY00025,TA0002,cryptominer,commodity,windows_10_enterprise,4,0.2778,755,376,16,16,15,0,2,36,1,0,1,1,1,1,0.1512,0.7154,0,1,0.0,1,0
|
| 28 |
+
S0002_0006,SPY00026,TA0002,spyware,commodity,windows_11_pro,2,0.3812,607,408,8,11,16,0,2,35,0,0,0,1,0,0,0.1446,0.6843,0,1,0.0,1,0
|
| 29 |
+
S0002_0007,APT00027,TA0002,apt_implant,apt,embedded_ot_firmware,0,1.0,513,439,8,12,15,0,1,29,0,0,0,0,0,0,0.326,0.6673,0,1,0.0,1,0
|
| 30 |
+
S0002_0008,FIL00028,TA0002,fileless_malware,crimeware,macos_ventura,6,0.7491,1050,725,4,13,16,0,2,53,0,0,0,1,1,1,0.2622,0.6845,1,0,0.0,1,0
|
| 31 |
+
S0002_0009,SPY00029,TA0002,spyware,apt,linux_ubuntu_22,2,0.7075,318,101,8,10,17,0,0,53,0,0,0,0,0,0,0.3057,0.7325,6,0,0.0,1,0
|
| 32 |
+
S0003_0000,SPY00030,TA0003,spyware,apt,macos_ventura,3,0.7541,462,130,8,8,15,0,2,48,0,1,0,1,1,0,0.3212,0.674,2,0,0.0,1,0
|
| 33 |
+
S0003_0001,ROO00031,TA0003,rootkit,crimeware,macos_ventura,2,0.694,491,407,9,13,26,0,3,51,0,0,0,0,0,1,0.2089,0.6744,1,1,0.224,1,1
|
| 34 |
+
S0003_0002,RAN00032,TA0003,ransomware,apt,windows_11_pro,1,0.6735,445,174,10,9,23,0,2,25,0,0,1,0,0,0,0.334,0.6687,4,0,0.6522,1,1
|
| 35 |
+
S0003_0003,FIL00033,TA0003,fileless_malware,commodity,windows_10_enterprise,6,0.5865,412,341,9,14,8,0,6,25,0,0,0,0,1,0,0.1454,0.6738,1,0,0.0,1,0
|
| 36 |
+
S0003_0004,APT00034,TA0003,apt_implant,commodity,linux_ubuntu_22,4,0.561,387,241,11,12,25,0,2,40,0,0,0,0,1,1,0.1526,0.6752,0,0,0.1548,1,1
|
| 37 |
+
S0003_0005,RAN00035,TA0003,ransomware,commodity,windows_server_2022,2,0.3323,464,189,6,18,21,0,2,27,1,0,0,0,0,0,0.1269,0.688,1,1,0.0,1,0
|
| 38 |
+
S0003_0006,APT00036,TA0003,apt_implant,apt,windows_11_pro,5,1.0,108,44,10,15,19,2,4,42,0,0,1,0,1,1,0.3212,0.6942,1,1,0.5129,1,1
|
| 39 |
+
S0003_0007,APT00037,TA0003,apt_implant,crimeware,windows_10_enterprise,11,0.831,238,204,10,17,24,1,5,57,0,0,0,0,1,1,0.208,0.6839,1,1,0.0,1,0
|
| 40 |
+
S0003_0008,ROO00038,TA0003,rootkit,commodity,linux_ubuntu_22,6,0.4877,296,77,2,6,16,1,3,31,1,0,0,0,1,0,0.1119,0.7233,1,1,0.0,1,0
|
| 41 |
+
S0003_0009,CRY00039,TA0003,cryptominer,crimeware,windows_10_enterprise,0,0.3622,372,288,7,14,21,0,3,49,0,0,0,0,0,1,0.2554,0.6529,2,1,0.6737,1,1
|
| 42 |
+
S0004_0000,TRO00040,TA0004,trojan,commodity,android_13,10,0.4154,474,269,12,18,16,0,2,45,1,1,0,0,1,1,0.1308,0.703,0,1,0.0,1,0
|
| 43 |
+
S0004_0001,BOT00041,TA0004,botnet_agent,apt,windows_10_enterprise,3,0.5885,420,403,5,9,19,0,2,54,0,0,0,0,1,1,0.3012,0.7056,1,0,0.0,1,0
|
| 44 |
+
S0004_0002,BOT00042,TA0004,botnet_agent,crimeware,windows_10_enterprise,5,0.4603,161,57,10,14,19,0,4,34,1,0,1,0,0,1,0.2392,0.7337,1,0,0.5718,1,1
|
| 45 |
+
S0004_0003,WOR00043,TA0004,worm,crimeware,linux_rhel_9,4,0.4219,1074,1046,9,16,14,1,4,46,1,0,0,0,1,0,0.2251,0.7233,3,1,0.1769,1,1
|
| 46 |
+
S0004_0004,RAN00044,TA0004,ransomware,crimeware,windows_10_enterprise,1,0.4805,334,259,11,6,19,0,5,37,0,1,1,1,0,1,0.2054,0.7133,2,1,0.0,1,0
|
| 47 |
+
S0004_0005,DRO00045,TA0004,dropper,crimeware,windows_10_enterprise,0,0.6297,169,124,7,9,21,1,2,42,0,0,1,0,1,0,0.244,0.6484,1,0,0.0,1,0
|
| 48 |
+
S0004_0006,SPY00046,TA0004,spyware,crimeware,windows_server_2022,1,0.6013,430,288,11,16,19,0,1,38,0,0,1,1,0,0,0.2129,0.7044,0,0,0.1496,1,1
|
| 49 |
+
S0004_0007,APT00047,TA0004,apt_implant,commodity,macos_ventura,4,0.5709,97,54,5,11,21,0,1,29,0,1,0,0,1,0,0.1469,0.6466,0,1,0.1768,1,1
|
| 50 |
+
S0004_0008,CRY00048,TA0004,cryptominer,commodity,windows_10_enterprise,11,0.2781,331,193,9,16,23,1,2,52,0,1,0,1,1,1,0.1509,0.6418,2,0,0.0592,1,1
|
| 51 |
+
S0004_0009,BOT00049,TA0004,botnet_agent,nation_state,windows_10_enterprise,1,0.7961,291,196,5,15,16,1,3,42,0,1,1,1,1,1,0.3724,0.6804,1,0,0.0,1,0
|
| 52 |
+
S0005_0000,BOT00050,TA0005,botnet_agent,nation_state,linux_ubuntu_22,10,0.8129,376,156,9,10,13,0,1,56,0,1,1,1,1,1,0.3762,0.6377,1,1,0.0,1,0
|
| 53 |
+
S0005_0001,TRO00051,TA0005,trojan,apt,embedded_ot_firmware,1,0.6984,542,345,10,13,15,0,3,38,0,0,0,1,0,1,0.3395,0.6388,1,1,0.0,1,0
|
| 54 |
+
S0005_0002,WOR00052,TA0005,worm,commodity,windows_11_pro,10,0.3647,285,133,7,13,17,0,0,60,0,1,0,1,0,0,0.179,0.6761,1,0,0.0,1,0
|
| 55 |
+
S0005_0003,SPY00053,TA0005,spyware,nation_state,windows_10_enterprise,0,0.9224,210,93,12,10,18,0,3,47,0,0,0,0,0,1,0.3647,0.6733,2,1,0.3031,1,1
|
| 56 |
+
S0005_0004,SPY00054,TA0005,spyware,apt,windows_10_enterprise,0,0.7579,413,99,9,12,21,1,1,59,0,1,1,1,1,0,0.3398,0.6692,1,0,0.0,1,0
|
| 57 |
+
S0005_0005,RAN00055,TA0005,ransomware,apt,windows_10_enterprise,8,0.6248,272,170,14,8,21,0,4,45,0,0,0,0,0,0,0.3249,0.635,0,1,0.0,1,0
|
| 58 |
+
S0005_0006,FIL00056,TA0005,fileless_malware,crimeware,windows_10_enterprise,0,0.6918,243,184,3,14,11,0,2,54,0,1,0,1,0,1,0.2292,0.6717,1,0,0.0,1,0
|
| 59 |
+
S0005_0007,TRO00057,TA0005,trojan,commodity,windows_server_2022,1,0.3612,557,535,7,14,17,0,5,50,0,1,0,1,1,0,0.1431,0.7143,0,0,0.0,1,0
|
| 60 |
+
S0005_0008,BOT00058,TA0005,botnet_agent,commodity,windows_10_enterprise,0,0.3419,612,146,5,10,15,1,2,33,0,1,0,1,0,0,0.1638,0.6733,1,0,0.0904,1,1
|
| 61 |
+
S0005_0009,CRY00059,TA0005,cryptominer,nation_state,windows_11_pro,7,0.6489,333,182,5,12,22,0,6,38,0,0,1,0,1,1,0.3687,0.7127,2,0,0.0,1,0
|
| 62 |
+
S0006_0000,DRO00060,TA0006,dropper,crimeware,windows_server_2022,4,0.6161,758,376,10,9,18,0,4,51,1,0,0,0,0,0,0.2137,0.7424,2,0,0.0,1,0
|
| 63 |
+
S0006_0001,BOT00061,TA0006,botnet_agent,commodity,windows_server_2022,11,0.3623,637,421,10,6,22,0,2,53,0,0,0,0,1,1,0.1003,0.7102,2,1,0.0,1,0
|
| 64 |
+
S0006_0002,WOR00062,TA0006,worm,crimeware,windows_10_enterprise,9,0.4036,735,302,9,16,23,1,2,52,0,0,0,1,1,1,0.2653,0.7015,1,1,0.0,1,0
|
| 65 |
+
S0006_0003,DRO00063,TA0006,dropper,crimeware,linux_rhel_9,1,0.6033,800,724,10,15,16,0,3,52,0,0,1,0,1,1,0.1951,0.6915,0,0,0.0,1,0
|
| 66 |
+
S0006_0004,SPY00064,TA0006,spyware,commodity,linux_ubuntu_22,10,0.3967,638,526,7,9,23,1,1,33,0,1,0,1,1,0,0.1913,0.6707,0,1,0.0,1,0
|
| 67 |
+
S0006_0005,WOR00065,TA0006,worm,apt,linux_ubuntu_22,9,0.5611,230,148,9,16,23,2,4,51,0,0,1,1,0,0,0.3317,0.695,0,1,0.0,1,0
|
| 68 |
+
S0006_0006,DRO00066,TA0006,dropper,apt,windows_10_enterprise,8,0.803,303,165,4,10,16,1,2,27,0,0,1,0,1,0,0.3109,0.673,5,0,0.0,1,0
|
| 69 |
+
S0006_0007,WOR00067,TA0006,worm,apt,windows_10_enterprise,6,0.571,594,543,9,15,17,2,4,41,0,0,1,1,0,0,0.3453,0.7284,0,0,0.0,1,0
|
| 70 |
+
S0006_0008,RAN00068,TA0006,ransomware,crimeware,android_13,2,0.4298,352,256,5,7,10,0,2,60,1,1,1,0,1,0,0.2651,0.6911,1,0,0.0234,1,1
|
| 71 |
+
S0006_0009,SPY00069,TA0006,spyware,crimeware,windows_11_pro,2,0.5554,172,100,4,4,17,0,5,38,1,0,1,1,0,0,0.2596,0.6877,1,1,0.0,1,0
|
| 72 |
+
S0007_0000,BOT00070,TA0007,botnet_agent,crimeware,windows_10_enterprise,2,0.4638,461,250,9,10,20,0,6,32,0,1,1,1,0,0,0.219,0.6872,2,0,0.0,1,0
|
| 73 |
+
S0007_0001,TRO00071,TA0007,trojan,crimeware,windows_11_pro,3,0.5438,284,145,11,11,18,1,5,54,1,1,1,1,1,1,0.2378,0.6797,3,1,0.1278,1,1
|
| 74 |
+
S0007_0002,SPY00072,TA0007,spyware,commodity,windows_server_2022,10,0.4044,573,444,5,16,21,0,3,58,0,0,0,1,1,1,0.1388,0.6352,1,0,0.0,1,0
|
| 75 |
+
S0007_0003,TRO00073,TA0007,trojan,crimeware,embedded_ot_firmware,0,0.54,338,75,16,17,30,0,6,59,0,0,1,0,0,0,0.2459,0.7191,2,0,0.0,1,0
|
| 76 |
+
S0007_0004,CRY00074,TA0007,cryptominer,commodity,windows_10_enterprise,9,0.339,1046,789,6,16,32,0,2,24,0,0,0,0,0,0,0.1525,0.6171,1,1,0.7932,1,1
|
| 77 |
+
S0007_0005,SPY00075,TA0007,spyware,crimeware,android_13,5,0.5422,677,370,9,14,22,0,4,45,1,0,1,1,1,1,0.2278,0.6758,0,0,0.0,1,0
|
| 78 |
+
S0007_0006,WOR00076,TA0007,worm,crimeware,windows_10_enterprise,0,0.4443,461,218,10,9,15,0,2,43,1,1,0,0,0,1,0.207,0.6753,2,1,0.0385,1,1
|
| 79 |
+
S0007_0007,ROO00077,TA0007,rootkit,commodity,windows_server_2022,0,0.5724,211,164,7,11,15,0,6,56,0,1,1,1,0,0,0.1714,0.6819,0,1,0.255,1,1
|
| 80 |
+
S0007_0008,FIL00078,TA0007,fileless_malware,commodity,windows_server_2022,10,0.4963,393,297,6,9,9,0,3,44,0,1,0,1,0,0,0.1898,0.6152,1,1,0.0,1,0
|
| 81 |
+
S0007_0009,CRY00079,TA0007,cryptominer,crimeware,windows_10_enterprise,5,0.3677,788,278,11,11,13,1,6,42,0,0,0,0,1,1,0.242,0.7092,2,1,0.0,1,0
|
| 82 |
+
S0008_0000,DRO00080,TA0008,dropper,commodity,windows_10_enterprise,2,0.5215,449,380,14,16,18,0,3,57,0,0,0,0,0,0,0.1622,0.694,0,1,0.0,1,0
|
| 83 |
+
S0008_0001,SPY00081,TA0008,spyware,nation_state,windows_11_pro,3,0.9258,304,159,9,10,18,0,2,53,0,1,1,1,1,1,0.383,0.692,7,0,0.1655,1,1
|
| 84 |
+
S0008_0002,TRO00082,TA0008,trojan,crimeware,embedded_ot_firmware,11,0.531,432,196,5,11,13,0,2,53,0,0,0,0,1,0,0.2801,0.6637,3,1,0.6242,1,1
|
| 85 |
+
S0008_0003,APT00083,TA0008,apt_implant,crimeware,windows_server_2022,6,0.7247,325,179,9,8,15,1,1,60,0,0,0,0,1,1,0.2831,0.706,0,1,0.0,1,0
|
| 86 |
+
S0008_0004,CRY00084,TA0008,cryptominer,crimeware,android_13,1,0.3906,339,251,8,7,20,0,4,41,1,1,0,1,1,0,0.2479,0.6307,2,1,0.1715,1,1
|
| 87 |
+
S0008_0005,BOT00085,TA0008,botnet_agent,commodity,linux_rhel_9,0,0.3674,414,320,13,9,15,0,4,27,1,0,1,1,1,0,0.141,0.7165,0,1,0.0,1,0
|
| 88 |
+
S0008_0006,RAN00086,TA0008,ransomware,nation_state,windows_11_pro,5,0.7548,349,292,6,13,18,1,2,36,1,1,0,0,1,1,0.3538,0.7326,2,1,0.0,1,0
|
| 89 |
+
S0008_0007,WOR00087,TA0008,worm,crimeware,linux_ubuntu_22,2,0.4328,272,218,11,16,17,2,1,52,0,0,1,0,0,0,0.2411,0.7245,0,0,0.0,1,0
|
| 90 |
+
S0008_0008,BOT00088,TA0008,botnet_agent,apt,windows_10_enterprise,1,0.575,763,589,4,9,16,2,3,38,0,0,0,0,0,1,0.3428,0.6743,6,0,0.0,1,0
|
| 91 |
+
S0008_0009,APT00089,TA0008,apt_implant,commodity,windows_10_enterprise,7,0.6262,195,113,8,10,26,1,2,35,0,1,0,1,1,0,0.1649,0.7157,1,0,0.0,1,0
|
| 92 |
+
S0009_0000,SPY00090,TA0009,spyware,crimeware,linux_rhel_9,3,0.6025,356,261,8,11,14,0,3,26,1,0,1,1,0,0,0.2522,0.7032,1,1,0.0,1,0
|
| 93 |
+
S0009_0001,APT00091,TA0009,apt_implant,crimeware,linux_ubuntu_22,11,0.7276,294,214,5,9,23,0,2,32,0,1,0,0,0,0,0.2476,0.589,1,1,0.0,1,0
|
| 94 |
+
S0009_0002,APT00092,TA0009,apt_implant,nation_state,windows_10_enterprise,9,1.0,188,170,10,8,13,2,5,40,0,0,1,0,1,1,0.3345,0.6676,3,1,0.0,1,0
|
| 95 |
+
S0009_0003,WOR00093,TA0009,worm,crimeware,windows_11_pro,8,0.4004,326,203,9,8,17,4,1,27,0,1,1,1,1,0,0.2065,0.7171,1,1,0.0,1,0
|
| 96 |
+
S0009_0004,APT00094,TA0009,apt_implant,crimeware,windows_server_2022,5,0.7797,311,189,10,20,12,0,0,58,0,0,1,1,0,1,0.2068,0.6568,5,0,0.0,1,0
|
| 97 |
+
S0009_0005,ROO00095,TA0009,rootkit,commodity,macos_ventura,7,0.5192,568,171,5,13,18,0,3,37,0,0,0,1,1,0,0.1392,0.6655,3,0,0.1176,1,1
|
| 98 |
+
S0009_0006,ROO00096,TA0009,rootkit,crimeware,windows_server_2022,2,0.6735,1075,880,10,14,10,0,4,42,1,0,0,1,0,1,0.2557,0.6799,0,1,0.0,1,0
|
| 99 |
+
S0009_0007,CRY00097,TA0009,cryptominer,crimeware,windows_11_pro,7,0.4096,404,351,8,13,13,0,2,44,1,0,1,1,1,0,0.2222,0.7118,3,0,0.0,1,0
|
| 100 |
+
S0009_0008,CRY00098,TA0009,cryptominer,crimeware,windows_11_pro,4,0.4154,153,90,18,15,21,0,1,37,0,1,0,1,1,1,0.2262,0.7247,0,0,0.0,1,0
|
| 101 |
+
S0009_0009,TRO00099,TA0009,trojan,commodity,windows_11_pro,3,0.3467,529,394,11,12,24,0,3,57,1,0,1,0,1,1,0.152,0.6584,0,1,0.0,1,0
|