The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 4 new columns ({'defender_id', 'affected_endpoint_id', 'event_detail', 'event_type'}) and 17 missing columns ({'detection_outcome', 'actor_capability_tier', 'c2_bytes_exfiltrated', 'encryption_throughput_mbps', 'blast_radius_pct', 'lateral_move_count', 'wiper_flag', 'defender_alert_score', 'ir_activated', 'endpoints_compromised', 'files_encrypted_cumulative', 'living_off_land_score', 'attribution_risk_score', 'attack_phase', 'credential_harvest_count', 'data_exfiltrated_gb', 'double_extortion_flag'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb005-sample/campaign_events.csv (at revision 1995364645f4ec9b79bd8b889327a7d38f4f0e7d), [/tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/attack_timelines.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/attack_timelines.csv), /tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/victim_topology.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/victim_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
campaign_id: string
actor_id: string
event_type: string
timestep: int64
target_segment_id: string
defender_id: string
affected_endpoint_id: string
event_detail: string
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1254
to
{'campaign_id': Value('string'), 'actor_id': Value('string'), 'timestep': Value('int64'), 'attack_phase': Value('string'), 'files_encrypted_cumulative': Value('int64'), 'encryption_throughput_mbps': Value('float64'), 'endpoints_compromised': Value('int64'), 'lateral_move_count': Value('int64'), 'credential_harvest_count': Value('int64'), 'c2_bytes_exfiltrated': Value('float64'), 'defender_alert_score': Value('float64'), 'detection_outcome': Value('string'), 'blast_radius_pct': Value('float64'), 'actor_capability_tier': Value('string'), 'living_off_land_score': Value('float64'), 'attribution_risk_score': Value('float64'), 'data_exfiltrated_gb': Value('float64'), 'wiper_flag': Value('int64'), 'double_extortion_flag': Value('int64'), 'ir_activated': Value('int64'), 'target_segment_id': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 4 new columns ({'defender_id', 'affected_endpoint_id', 'event_detail', 'event_type'}) and 17 missing columns ({'detection_outcome', 'actor_capability_tier', 'c2_bytes_exfiltrated', 'encryption_throughput_mbps', 'blast_radius_pct', 'lateral_move_count', 'wiper_flag', 'defender_alert_score', 'ir_activated', 'endpoints_compromised', 'files_encrypted_cumulative', 'living_off_land_score', 'attribution_risk_score', 'attack_phase', 'credential_harvest_count', 'data_exfiltrated_gb', 'double_extortion_flag'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb005-sample/campaign_events.csv (at revision 1995364645f4ec9b79bd8b889327a7d38f4f0e7d), [/tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/attack_timelines.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/attack_timelines.csv), /tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/97005327771152-config-parquet-and-info-xpertsystems-cyb005-sampl-1714db99/hub/datasets--xpertsystems--cyb005-sample/snapshots/1995364645f4ec9b79bd8b889327a7d38f4f0e7d/victim_topology.csv (origin=hf://datasets/xpertsystems/cyb005-sample@1995364645f4ec9b79bd8b889327a7d38f4f0e7d/victim_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
campaign_id string | actor_id string | timestep int64 | attack_phase string | files_encrypted_cumulative int64 | encryption_throughput_mbps float64 | endpoints_compromised int64 | lateral_move_count int64 | credential_harvest_count int64 | c2_bytes_exfiltrated float64 | defender_alert_score float64 | detection_outcome string | blast_radius_pct float64 | actor_capability_tier string | living_off_land_score float64 | attribution_risk_score float64 | data_exfiltrated_gb float64 | wiper_flag int64 | double_extortion_flag int64 | ir_activated int64 | target_segment_id string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CAMP000001 | ACT0001 | 0 | initial_access | 0 | 0 | 0 | 0 | 0 | 80.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 1 | initial_access | 0 | 0 | 0 | 0 | 0 | 860.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 2 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,129.3 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 3 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,588.6 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 4 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,829.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 5 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,967.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 6 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,060 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 7 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,185.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 8 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,215.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 9 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,322.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 10 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,409.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 11 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,777.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 12 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,982.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 13 | initial_access | 0 | 0 | 0 | 0 | 0 | 4,743 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 14 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,384.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 15 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,386.3 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 16 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,537.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 17 | initial_access | 0 | 0 | 0 | 0 | 0 | 6,195.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 18 | initial_access | 0 | 0 | 0 | 0 | 0 | 6,538.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 19 | internal_recon | 0 | 0 | 0 | 0 | 2 | 8,340.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 20 | internal_recon | 0 | 0 | 0 | 0 | 2 | 9,643.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 21 | internal_recon | 0 | 0 | 0 | 0 | 3 | 12,080 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 22 | internal_recon | 0 | 0 | 0 | 0 | 3 | 12,432.6 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 23 | internal_recon | 0 | 0 | 0 | 0 | 4 | 12,614 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 24 | internal_recon | 0 | 0 | 0 | 0 | 5 | 12,959.1 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 25 | internal_recon | 0 | 0 | 0 | 0 | 5 | 14,156.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 26 | internal_recon | 0 | 0 | 0 | 0 | 5 | 15,593.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 27 | internal_recon | 0 | 0 | 0 | 0 | 6 | 18,234 | 0 | no_detection | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 28 | internal_recon | 0 | 0 | 0 | 0 | 8 | 19,223.8 | 0 | no_detection | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 29 | lateral_movement | 0 | 0 | 26 | 26 | 8 | 19,527.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 30 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 19,920.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 31 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 20,125.2 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 32 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 20,454.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 33 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 21,585 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 34 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 1,290,617 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 1.269 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 35 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 3,071,483.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 1.781 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 36 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 5,235,916.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 2.164 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 37 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 7,624,645.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 2.389 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 38 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 11,849,588.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.225 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 39 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 16,271,996.5 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.422 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 40 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 20,946,279.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.674 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 41 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 26,330,570.2 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 5.384 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 42 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 31,816,805.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 5.486 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 43 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 38,550,569.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 6.734 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 44 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 46,025,779.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 7.475 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 45 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 54,424,915.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 8.399 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 46 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 63,527,322.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.102 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 47 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 73,025,307.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.498 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 48 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 82,715,529.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.69 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 49 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 92,808,046.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.093 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 50 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 103,106,807.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.299 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 51 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 114,069,495.7 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.963 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 52 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 125,890,241.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 11.821 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 53 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 139,177,576 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 13.287 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 54 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 55 | encryption_detonation | 7,578 | 47.168 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 56 | encryption_detonation | 17,061 | 39.663 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 57 | encryption_detonation | 27,646 | 38.245 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 58 | encryption_detonation | 38,343 | 54.313 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 59 | encryption_detonation | 51,724 | 71.346 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 60 | encryption_detonation | 67,233 | 38.242 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 61 | encryption_detonation | 74,277 | 23.686 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 62 | encryption_detonation | 82,497 | 71.044 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 63 | encryption_detonation | 92,220 | 66.385 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 64 | encryption_detonation | 103,087 | 45.441 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 65 | encryption_detonation | 107,574 | 41.642 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 66 | encryption_detonation | 116,518 | 45.118 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 67 | encryption_detonation | 122,575 | 62.676 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 68 | encryption_detonation | 132,445 | 31.488 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 69 | encryption_detonation | 139,708 | 46.891 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 70 | encryption_detonation | 148,655 | 71.752 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 71 | encryption_detonation | 155,159 | 67.565 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 72 | encryption_detonation | 162,027 | 51.052 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 73 | encryption_detonation | 167,757 | 58.26 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 74 | ransom_negotiation | 167,757 | 0 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | delayed_detection | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 1 | SEG00271 |
CAMP000002 | ACT0001 | 0 | initial_access | 0 | 0 | 0 | 0 | 0 | 127.1 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 1 | initial_access | 0 | 0 | 0 | 0 | 0 | 356.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 2 | initial_access | 0 | 0 | 0 | 0 | 0 | 992.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 3 | internal_recon | 0 | 0 | 0 | 0 | 0 | 1,037.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 4 | internal_recon | 0 | 0 | 0 | 0 | 0 | 1,923.8 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 5 | internal_recon | 0 | 0 | 0 | 0 | 1 | 1,973.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 6 | internal_recon | 0 | 0 | 0 | 0 | 2 | 3,242.2 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 7 | internal_recon | 0 | 0 | 0 | 0 | 3 | 5,509.4 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 8 | internal_recon | 0 | 0 | 0 | 0 | 3 | 7,645 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 9 | internal_recon | 0 | 0 | 0 | 0 | 3 | 8,945.3 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 10 | internal_recon | 0 | 0 | 0 | 0 | 4 | 10,307.1 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 11 | internal_recon | 0 | 0 | 0 | 0 | 4 | 10,495 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 12 | internal_recon | 0 | 0 | 0 | 0 | 5 | 12,096.8 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 13 | internal_recon | 0 | 0 | 0 | 0 | 6 | 12,225.3 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 14 | internal_recon | 0 | 0 | 0 | 0 | 9 | 12,744.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 15 | internal_recon | 0 | 0 | 0 | 0 | 9 | 13,776.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 16 | internal_recon | 0 | 0 | 0 | 0 | 9 | 14,379.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 17 | internal_recon | 0 | 0 | 0 | 0 | 10 | 16,023.6 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 18 | internal_recon | 0 | 0 | 0 | 0 | 12 | 17,247.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 19 | internal_recon | 0 | 0 | 0 | 0 | 13 | 19,435.6 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 20 | internal_recon | 0 | 0 | 0 | 0 | 14 | 20,814.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 21 | internal_recon | 0 | 0 | 0 | 0 | 16 | 21,450.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 22 | internal_recon | 0 | 0 | 0 | 0 | 18 | 22,031.7 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 23 | internal_recon | 0 | 0 | 0 | 0 | 19 | 23,034.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 24 | internal_recon | 0 | 0 | 0 | 0 | 21 | 23,061 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CYB005 — Synthetic Ransomware Attack Simulation Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB005-SAMPLE · Version 1.0.0
This is a free preview of the full CYB005 — Synthetic Ransomware Attack Simulation Dataset product. It contains roughly ~10% of the full dataset at identical schema, actor-tier distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.
🤖 Trained baseline available: xpertsystems/cyb005-baseline-classifier — XGBoost + PyTorch MLP for 4-tier threat-actor attribution (the README's stated headline use case), group-aware split by campaign, multi-seed evaluation (ROC-AUC 0.853 ± 0.031), honest leakage audit of every per-timestep feature.
Note: This sample is intentionally larger than the other CYB SKU samples. CYB005 benchmarks are conditional on small actor-tier subsets (e.g. nation_state campaigns are ~10% of the fleet), so a larger sample is needed to demonstrate the full product's benchmark calibration reliably.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
victim_topology.csv |
~300 | ~3,200 | Network segment registry |
campaign_summary.csv |
~500 | ~5,500 | Per-campaign outcome aggregates |
campaign_events.csv |
~190,137 | ~60,000 | Discrete campaign event log |
attack_timelines.csv |
~37,489 | ~290,000 | Per-timestep campaign trajectory data |
Dataset Summary
CYB005 simulates end-to-end ransomware campaign lifecycles as a 7-phase state machine across enterprise, cloud, and OT/ICS environments, with:
- 4 actor capability tiers: lone_actor, organised_syndicate, raas_affiliate, nation_state_nexus — with per-tier encryption speed, ransom demand distributions, wiper component probabilities, and lateral movement aggression
- 6 victim backup maturity tiers: no_backup, local_only, network_attached, cloud_replicated, immutable_object_lock, air_gapped_gold_standard — with empirically-calibrated recovery probabilities
- 8 segment types: corporate_lan, dmz, cloud_workload, ot_ics_control, endpoint_subnet, soc_management, zero_trust_zone, backup_repository
- 7 attack phases: initial_access, persistence, privilege_escalation, lateral_movement, data_exfiltration, encryption_deployment, ransom_demand
- Double extortion modeling (data exfiltration + encryption)
- VSS (Volume Shadow Copy) deletion, wiper components, and worm spread
- Living-off-the-Land (LotL) abuse and EDR signature lag modeling
- Financial impact scoring with ransom demand × payment probability
Trained Baseline Available
A working baseline classifier trained on this sample is published at xpertsystems/cyb005-baseline-classifier.
| Component | Detail |
|---|---|
| Task | 4-class threat-actor capability-tier attribution (the README's headline use case) |
| Models | XGBoost (model_xgb.json) + PyTorch MLP (model_mlp.safetensors) |
| Features | 63 (after one-hot encoding); pipeline included as feature_engineering.py |
| Split | Group-aware by campaign_id — train/val/test campaigns disjoint |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | inference_example.ipynb — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.603 ± 0.040, macro ROC-AUC 0.853 ± 0.031 (multi-seed) |
This is the first XpertSystems baseline to ship the dataset's stated headline use case (rather than pivoting to a phase-prediction subtask as the smaller CYB002 / CYB003 / CYB004 samples required). CYB005's 500-campaign sample is large enough that tier attribution learns honestly under group-aware splitting.
Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics drawn from authoritative ransomware threat intelligence sources (Mandiant M-Trends, CrowdStrike GTR, Coveware Quarterly Ransomware Report, Sophos State of Ransomware, IBM CODB, Verizon DBIR, CISA #StopRansomware, Chainalysis). The sample preserves the same calibration:
| Test | Target | Observed | Verdict |
|---|---|---|---|
| 01_blast_radius_pct_organised_syndicate_low_seg | 0.3700 | 0.3302 | ✓ PASS |
| 02_dwell_time_pre_detonation_hrs_median | 204.0000 | 226.1000 | ✓ PASS |
| 03_ransom_paid_rate_all_tiers | 0.2900 | 0.2941 | ✓ PASS |
| 04_recovery_without_payment_rate_immutable | 0.7200 | 0.7292 | ✓ PASS |
| 05_double_extortion_rate_raas_syndicate | 0.7700 | 0.7400 | ✓ PASS |
| 06_mttd_hrs_global_median | 192.0000 | 203.5600 | ✓ PASS |
| 07_ransom_demand_usd_median_raas | 650,000 | 633,445 | ✓ PASS |
| 08_vss_deletion_success_rate | 0.6800 | 0.6529 | ✓ PASS |
| 09_edr_alert_rate_per_lateral_move | 0.5400 | 0.5123 | ✓ PASS |
| 10_wiper_component_rate_nation_state | 0.2200 | 0.2933 | ~ MARGINAL |
| 11_backup_destruction_rate_weak_tiers | 0.4200 | 0.4126 | ✓ PASS |
| 12_financial_impact_score_syndicate | 0.6100 | 0.5810 | ✓ PASS |
Note: some benchmarks (e.g. wiper component rate, blast radius) require larger sample sizes to converge tightly because they're conditional on small-population subsets (e.g. nation-state campaigns are ~10% of fleet). The full product passes all 12 benchmarks at Grade A+ or better.
Schema Highlights
attack_timelines.csv (primary file, per-timestep)
| Column | Type | Description |
|---|---|---|
| campaign_id | string | Unique campaign identifier |
| actor_id | string | Threat actor ID |
| timestep | int | Step in 7-phase lifecycle (0–74) |
| campaign_phase | string | 1 of 7 phases |
| actor_capability_tier | string | lone_actor / organised_syndicate / raas_affiliate / nation_state_nexus |
| segment_id | string | FK to victim_topology.csv |
| backup_maturity_tier | string | 6 tiers from no_backup to air_gapped |
| endpoints_compromised | int | Cumulative endpoints affected |
| blast_radius_pct | float | Fleet-wide compromise percentage |
| lateral_pivots | int | Lateral movement count |
| edr_alerted | int | Boolean — EDR alert raised |
| siem_correlated | int | Boolean — SIEM correlation event |
| lotl_technique_used | string | LotL binary if any |
| vss_deletion_attempted | int | Boolean — Volume Shadow Copy deletion |
| wiper_component_deployed | int | Boolean — destructive wiper present |
| data_exfiltrated_gb | float | Cumulative exfiltrated data |
| dwell_hours | float | Cumulative attacker dwell time |
| c2_beacon_active | int | C2 channel beaconing flag |
campaign_summary.csv (per-campaign outcome)
| Column | Type | Description |
|---|---|---|
| campaign_id, actor_id | string | Identifiers |
| actor_capability_tier | string | Tier classification target |
| backup_maturity_tier | string | Victim backup posture |
| campaign_outcome | string | success / partial / detected / aborted |
| ransom_demand_usd | float | Ransom amount demanded |
| ransom_paid_flag | int | Boolean — ransom paid |
| recovery_without_payment_flag | int | Boolean — restored from backup |
| double_extortion_flag | int | Boolean — data leak threat |
| wiper_component_flag | int | Boolean — wiper deployed |
| dwell_time_pre_detonation_hrs | float | Hours from access to encryption |
| mean_time_to_detect_hrs | float | Hours from access to first detection |
| financial_impact_score | float | Composite impact score (0–1) |
| blast_radius_pct | float | Fleet compromise percentage |
See campaign_events.csv and victim_topology.csv for the discrete event
log and segment registry schemas respectively.
Suggested Use Cases
- Training ransomware classifier models — worked example available
- Backup posture risk modeling — predict recovery likelihood from 6-tier backup maturity
- Dwell time forecasting under varying actor capability and defender maturity
- Double extortion prediction (data theft + encryption modeling)
- Wiper component detection — distinguishing destructive vs financial ransomware
- VSS deletion / shadow copy abuse detection
- Financial impact estimation — ransom demand + payment probability
- EDR alert correlation — SIEM signal-to-noise modeling
- Incident response simulation — purple-team exercises with calibrated attacker behavior
Loading the Data
import pandas as pd
timelines = pd.read_csv("attack_timelines.csv")
summaries = pd.read_csv("campaign_summary.csv")
events = pd.read_csv("campaign_events.csv")
topology = pd.read_csv("victim_topology.csv")
# Join per-timestep data with campaign-level labels and topology
enriched = timelines.merge(summaries, on=["campaign_id", "actor_id"], how="left",
suffixes=("", "_summary"))
enriched = enriched.merge(topology, on="segment_id", how="left")
# Actor-tier classification target
y_tier = summaries["actor_capability_tier"]
# Binary outcomes
y_paid = summaries["ransom_paid_flag"]
y_recovered = summaries["recovery_without_payment_flag"]
y_wiper = summaries["wiper_component_flag"]
For a worked end-to-end example with actor-tier classification, group-aware splitting, and feature engineering, see the inference notebook in the baseline classifier repo.
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB005 dataset includes ~358,000 rows across all four files, with calibrated benchmark validation against 12 metrics drawn from authoritative ransomware threat intelligence sources.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb005_sample_2026,
title = {CYB005: Synthetic Ransomware Attack Simulation Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb005-sample}
}
Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:03:22 UTC
- Campaign model : 7-phase ransomware kill-chain state machine
- Overall benchmark : 97.7 / 100 (grade A+)
- Downloads last month
- 29