solsticestudioai commited on
Commit
35fef0a
·
verified ·
1 Parent(s): e6f1af8

Add schema doc

Browse files
Files changed (1) hide show
  1. SCHEMA.md +95 -0
SCHEMA.md ADDED
@@ -0,0 +1,95 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Nemesis Cyber Threat Simulation Pack — Schema
2
+
3
+ One row = one simulated adversarial attack episode, end-to-end. All records share the same eight top-level fields.
4
+
5
+ Schema version: `1.0.0-nemesis-cyber-sample`
6
+
7
+ ## Top-level fields
8
+
9
+ ### `schema_version` — string
10
+ Schema identifier. Constant within a sample release. Used to detect pack version drift.
11
+
12
+ ### `event` — struct
13
+ Identifier fields and the overall decision outcome.
14
+
15
+ | Field | Type | Notes |
16
+ |---|---|---|
17
+ | `id` | string | Stable episode identifier, e.g., `NEMESIS-1541935`. |
18
+ | `timestamp` | string (ISO-8601) | Episode start time. |
19
+ | `trace_id` | string (UUID) | Cross-links telemetry steps within the episode. |
20
+ | `weighted_score` | double | Aggregate risk score for this episode. |
21
+ | `decision_outcome` | string | One of: `detected_by_soc`, `blocked_by_edr`, `stealth_maintained`, `exfiltration_complete`, `impact_achieved`. |
22
+
23
+ ### `risk_context` — struct
24
+ Environmental context and the triggering signal that initiated the adversarial episode.
25
+
26
+ | Field | Type | Notes |
27
+ |---|---|---|
28
+ | `trigger` | string | Short-code for the initial trigger (e.g., `phishing_attachment_opened`, `k8s_pod_escape`, `iam_policy_modification`, `unusual_ingress_traffic`). |
29
+ | `protocol` | string | Protection domain / environment: `AWS-Cloud`, `Active-Directory`, `Kubernetes`, `Web-App-Gateway`. |
30
+ | `chain` | string | Target environment identifier (e.g., `us-east-1`, `windows-server-2022`, `prod-cluster-01`, `ubuntu-22.04`). |
31
+ | `impacted_asset` | string | Named asset under attack (e.g., `ntds.dit`, `kube-apiserver`, IAM role name, app endpoint). |
32
+ | `anomaly_signature` | string | Human-readable summary of the triggering anomaly. |
33
+
34
+ ### `agent_reasoning` — struct
35
+ Planner-side metadata for the adversarial agent that selected and executed this episode.
36
+
37
+ | Field | Type | Notes |
38
+ |---|---|---|
39
+ | `engine` | string | Planner engine label. In this sample: `nemesis_planner`. |
40
+ | `winning_strategy` | string | Selected top-level strategy (e.g., `Stealth_Escalation`). |
41
+ | `confidence_score` | double | Planner confidence in the chosen strategy at selection time. |
42
+ | `mcts_branches` | int64 | Number of MCTS branches considered before the selection. |
43
+
44
+ ### `correlated_telemetry` — list<struct>
45
+ Ordered sequence of steps taken during the episode. One struct per step.
46
+
47
+ Step struct:
48
+
49
+ | Field | Type | Notes |
50
+ |---|---|---|
51
+ | `action` | string | ATT&CK-style action code (e.g., `USER_DISCOVERY`, `LSASS_MEMORY_DUMP`, `CRED_ACCESS_PASS_THE_HASH`, `LATERAL_SMB_EXEC`, `IMPACT_DATA_ENCRYPTED`). |
52
+ | `component` | string | Which internal component emitted the step (`NEMESIS_ORCHESTRATOR`, `NEMESIS_GHOST`, `NEMESIS_EXPLOIT`). |
53
+ | `timestamp` | string (ISO-8601) | Step timestamp. |
54
+ | `telemetry.evasion_score` | double | 0–1. Higher = more evasive. |
55
+ | `telemetry.latency_ms` | int64 | Step execution latency in milliseconds. |
56
+ | `telemetry.noise_level_db` | int64 | Relative noise generated by the step. |
57
+ | `telemetry.node_provider` | string | Observing detection surface (e.g., `Azure_Sentinel`, `CrowdStrike`, `CloudTrail`). |
58
+
59
+ ### `execution_summary` — struct
60
+ Roll-up metrics for the full episode.
61
+
62
+ | Field | Type | Notes |
63
+ |---|---|---|
64
+ | `strategy` | string | Final strategy label executed (matches or post-adjusts the `agent_reasoning.winning_strategy`). |
65
+ | `success_rate` | double | 0–1 score of action-chain completion against plan. |
66
+ | `total_execution_ms` | int64 | End-to-end episode duration. |
67
+ | `noise_penalty` | double | Penalty contribution from cumulative step noise. |
68
+
69
+ ### `genetic_optimizer_feedback` — struct
70
+ Outer-loop optimizer feedback used to tune future planner iterations.
71
+
72
+ | Field | Type | Notes |
73
+ |---|---|---|
74
+ | `fitness_score_update` | double | Delta applied to the strategy's fitness score after this episode. |
75
+ | `parameter_drift` | string | Coarse drift descriptor (`none`, `minor`, `major`, …). |
76
+
77
+ ### `decision_outcome` — string
78
+ Duplicated from `event.decision_outcome` for quick grouping and classification without struct unpacking.
79
+
80
+ ## Distribution of this sample
81
+
82
+ - 10,000 rows, stratified 2,000 per outcome class across all five outcomes.
83
+ - Balanced across four `protocol` environments: AWS-Cloud, Active-Directory, Kubernetes, Web-App-Gateway.
84
+ - Triggers map 1:1 to protocols in this sample.
85
+ - Planner engine label is constant (`nemesis_planner`) after sanitization of internal method identifiers.
86
+
87
+ ## Sanitization notes
88
+
89
+ - Internal identifier prefixes (e.g., `SIMA-V4-CYBER-*`) have been normalized to `NEMESIS-*`.
90
+ - Internal planner engine code names have been normalized to `nemesis_planner`.
91
+ - No real hostnames, users, indicators of compromise, credentials, exploit code, or victim data are present.
92
+
93
+ ## Relationship to the full pack
94
+
95
+ The production pack contains 2.5M episodes with a richer protocol and trigger space, adversary persona variants, campaign-level chains spanning multiple episodes, per-step process tree fragments, and defender-side reasoning traces. See the pack card for commercial access.