Datasets:
Add schema doc
Browse files
SCHEMA.md
ADDED
|
@@ -0,0 +1,95 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Nemesis Cyber Threat Simulation Pack — Schema
|
| 2 |
+
|
| 3 |
+
One row = one simulated adversarial attack episode, end-to-end. All records share the same eight top-level fields.
|
| 4 |
+
|
| 5 |
+
Schema version: `1.0.0-nemesis-cyber-sample`
|
| 6 |
+
|
| 7 |
+
## Top-level fields
|
| 8 |
+
|
| 9 |
+
### `schema_version` — string
|
| 10 |
+
Schema identifier. Constant within a sample release. Used to detect pack version drift.
|
| 11 |
+
|
| 12 |
+
### `event` — struct
|
| 13 |
+
Identifier fields and the overall decision outcome.
|
| 14 |
+
|
| 15 |
+
| Field | Type | Notes |
|
| 16 |
+
|---|---|---|
|
| 17 |
+
| `id` | string | Stable episode identifier, e.g., `NEMESIS-1541935`. |
|
| 18 |
+
| `timestamp` | string (ISO-8601) | Episode start time. |
|
| 19 |
+
| `trace_id` | string (UUID) | Cross-links telemetry steps within the episode. |
|
| 20 |
+
| `weighted_score` | double | Aggregate risk score for this episode. |
|
| 21 |
+
| `decision_outcome` | string | One of: `detected_by_soc`, `blocked_by_edr`, `stealth_maintained`, `exfiltration_complete`, `impact_achieved`. |
|
| 22 |
+
|
| 23 |
+
### `risk_context` — struct
|
| 24 |
+
Environmental context and the triggering signal that initiated the adversarial episode.
|
| 25 |
+
|
| 26 |
+
| Field | Type | Notes |
|
| 27 |
+
|---|---|---|
|
| 28 |
+
| `trigger` | string | Short-code for the initial trigger (e.g., `phishing_attachment_opened`, `k8s_pod_escape`, `iam_policy_modification`, `unusual_ingress_traffic`). |
|
| 29 |
+
| `protocol` | string | Protection domain / environment: `AWS-Cloud`, `Active-Directory`, `Kubernetes`, `Web-App-Gateway`. |
|
| 30 |
+
| `chain` | string | Target environment identifier (e.g., `us-east-1`, `windows-server-2022`, `prod-cluster-01`, `ubuntu-22.04`). |
|
| 31 |
+
| `impacted_asset` | string | Named asset under attack (e.g., `ntds.dit`, `kube-apiserver`, IAM role name, app endpoint). |
|
| 32 |
+
| `anomaly_signature` | string | Human-readable summary of the triggering anomaly. |
|
| 33 |
+
|
| 34 |
+
### `agent_reasoning` — struct
|
| 35 |
+
Planner-side metadata for the adversarial agent that selected and executed this episode.
|
| 36 |
+
|
| 37 |
+
| Field | Type | Notes |
|
| 38 |
+
|---|---|---|
|
| 39 |
+
| `engine` | string | Planner engine label. In this sample: `nemesis_planner`. |
|
| 40 |
+
| `winning_strategy` | string | Selected top-level strategy (e.g., `Stealth_Escalation`). |
|
| 41 |
+
| `confidence_score` | double | Planner confidence in the chosen strategy at selection time. |
|
| 42 |
+
| `mcts_branches` | int64 | Number of MCTS branches considered before the selection. |
|
| 43 |
+
|
| 44 |
+
### `correlated_telemetry` — list<struct>
|
| 45 |
+
Ordered sequence of steps taken during the episode. One struct per step.
|
| 46 |
+
|
| 47 |
+
Step struct:
|
| 48 |
+
|
| 49 |
+
| Field | Type | Notes |
|
| 50 |
+
|---|---|---|
|
| 51 |
+
| `action` | string | ATT&CK-style action code (e.g., `USER_DISCOVERY`, `LSASS_MEMORY_DUMP`, `CRED_ACCESS_PASS_THE_HASH`, `LATERAL_SMB_EXEC`, `IMPACT_DATA_ENCRYPTED`). |
|
| 52 |
+
| `component` | string | Which internal component emitted the step (`NEMESIS_ORCHESTRATOR`, `NEMESIS_GHOST`, `NEMESIS_EXPLOIT`). |
|
| 53 |
+
| `timestamp` | string (ISO-8601) | Step timestamp. |
|
| 54 |
+
| `telemetry.evasion_score` | double | 0–1. Higher = more evasive. |
|
| 55 |
+
| `telemetry.latency_ms` | int64 | Step execution latency in milliseconds. |
|
| 56 |
+
| `telemetry.noise_level_db` | int64 | Relative noise generated by the step. |
|
| 57 |
+
| `telemetry.node_provider` | string | Observing detection surface (e.g., `Azure_Sentinel`, `CrowdStrike`, `CloudTrail`). |
|
| 58 |
+
|
| 59 |
+
### `execution_summary` — struct
|
| 60 |
+
Roll-up metrics for the full episode.
|
| 61 |
+
|
| 62 |
+
| Field | Type | Notes |
|
| 63 |
+
|---|---|---|
|
| 64 |
+
| `strategy` | string | Final strategy label executed (matches or post-adjusts the `agent_reasoning.winning_strategy`). |
|
| 65 |
+
| `success_rate` | double | 0–1 score of action-chain completion against plan. |
|
| 66 |
+
| `total_execution_ms` | int64 | End-to-end episode duration. |
|
| 67 |
+
| `noise_penalty` | double | Penalty contribution from cumulative step noise. |
|
| 68 |
+
|
| 69 |
+
### `genetic_optimizer_feedback` — struct
|
| 70 |
+
Outer-loop optimizer feedback used to tune future planner iterations.
|
| 71 |
+
|
| 72 |
+
| Field | Type | Notes |
|
| 73 |
+
|---|---|---|
|
| 74 |
+
| `fitness_score_update` | double | Delta applied to the strategy's fitness score after this episode. |
|
| 75 |
+
| `parameter_drift` | string | Coarse drift descriptor (`none`, `minor`, `major`, …). |
|
| 76 |
+
|
| 77 |
+
### `decision_outcome` — string
|
| 78 |
+
Duplicated from `event.decision_outcome` for quick grouping and classification without struct unpacking.
|
| 79 |
+
|
| 80 |
+
## Distribution of this sample
|
| 81 |
+
|
| 82 |
+
- 10,000 rows, stratified 2,000 per outcome class across all five outcomes.
|
| 83 |
+
- Balanced across four `protocol` environments: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway.
|
| 84 |
+
- Triggers map 1:1 to protocols in this sample.
|
| 85 |
+
- Planner engine label is constant (`nemesis_planner`) after sanitization of internal method identifiers.
|
| 86 |
+
|
| 87 |
+
## Sanitization notes
|
| 88 |
+
|
| 89 |
+
- Internal identifier prefixes (e.g., `SIMA-V4-CYBER-*`) have been normalized to `NEMESIS-*`.
|
| 90 |
+
- Internal planner engine code names have been normalized to `nemesis_planner`.
|
| 91 |
+
- No real hostnames, users, indicators of compromise, credentials, exploit code, or victim data are present.
|
| 92 |
+
|
| 93 |
+
## Relationship to the full pack
|
| 94 |
+
|
| 95 |
+
The production pack contains 2.5M episodes with a richer protocol and trigger space, adversary persona variants, campaign-level chains spanning multiple episodes, per-step process tree fragments, and defender-side reasoning traces. See the pack card for commercial access.
|