--- license: cc-by-4.0 task_categories: - tabular-classification - text-classification language: - en tags: - synthetic - cybersecurity - threat-intelligence - red-team - blue-team - soc - siem - edr - mitre-attack - detection-engineering - security-analytics - adversarial-simulation - agentic-ai pretty_name: Nemesis Cyber Threat Simulation Pack size_categories: - 10K | Ordered action chain with per-step telemetry (latency, noise, evasion score, node provider) | | `execution_summary` | struct | `strategy`, `success_rate`, `total_execution_ms`, `noise_penalty` | | `genetic_optimizer_feedback` | struct | `fitness_score_update`, `parameter_drift` | | `decision_outcome` | string | Final label (duplicated from `event.decision_outcome` for convenience) | See [SCHEMA.md](./SCHEMA.md) for the full nested field breakdown. ## Why this dataset is useful Most public cybersecurity datasets are either raw packet captures, static CTI feeds, or narrow single-technique labeling sets. This pack is shaped around what detection-engineering and SOC-analytics teams actually need to train modern models: - Multi-step attack episodes rather than isolated alerts - Balanced outcome classes across detected, blocked, stealthy, and successful attempts - Adversarial reasoning trace (strategy + MCTS branch count + confidence) alongside the telemetry - Per-step evasion and noise signals to train detection models that weigh stealth vs noise trade-offs - Cross-environment coverage (cloud, identity, container, web) - Stable schema suitable for dashboard prototyping, triage simulators, and ML pipelines ## Typical use cases - SOC triage and alert-prioritization model training - Detection engineering rule evaluation against balanced positive and negative cases - Adversarial-AI research on multi-step planner behavior - Tabletop and red-vs-blue simulator content - LLM fine-tuning on incident narratives and defender reasoning - Benchmarking anomaly-scoring and false-positive reduction pipelines - Dashboard and BI template development for security analytics ## Quick start ```python import pandas as pd import pyarrow.parquet as pq df = pq.read_table("nemesis_cyber_sample.parquet").to_pandas() # Outcome distribution (stratified balanced) print(df["decision_outcome"].value_counts()) # Evasion pressure per environment df["protocol"] = df["risk_context"].apply(lambda r: r.get("protocol")) df["avg_evasion"] = df["correlated_telemetry"].apply( lambda steps: sum(s["telemetry"]["evasion_score"] for s in steps) / max(len(steps), 1) ) print(df.groupby("protocol")["avg_evasion"].mean().round(3)) # Detection-rate by trigger type df["trigger"] = df["risk_context"].apply(lambda r: r.get("trigger")) detection_rate = (df["decision_outcome"].isin(["detected_by_soc", "blocked_by_edr"]) .groupby(df["trigger"]).mean().round(3)) print(detection_rate) ``` Streaming form: ```python import json with open("nemesis_cyber_sample.jsonl") as f: for line in f: episode = json.loads(line) # one episode per line ``` ## Responsible use This dataset is intended for **defensive** research: detection modeling, SOC tooling, and adversarial-agent studies. It contains synthesized attack metadata and MITRE-aligned TTP labels — it does **not** contain working offensive payloads, exploit code, shellcode, malware samples, credentials, private vulnerability details, or any real-world victim data. Please use it to improve defenses. ## License Released under **CC BY 4.0**. Use freely for research, detection-engineering, education, and commercial prototyping with attribution. ## Get the full pack This Hugging Face repo is a **10K-episode sample**. The production pack scales to 2.5M+ episodes, additional outcome labels, richer per-step telemetry, attacker/defender variant splits, multi-environment campaign chains, parquet + JSONL + SIEM-import formats, and buyer-specific variants. **Self-serve (Stripe checkout):** - [**Sample Scale tier — $5,000**](https://buy.stripe.com/7sY5kD2j85QTfSb5lfeEo03) — ~25K records, one subject, 72-hour delivery. **Full pack + enterprise scope:** - [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets) — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants. **Procurement catalog:** - [SolsticeAI Data Storefront](https://solsticeai.mydatastorefront.com) — available via Datarade / Monda. ## Citation ```bibtex @dataset{solstice_nemesis_cyber_pack_2026, title = {Nemesis Cyber Threat Simulation Pack (Sample)}, author = {SolsticeAI}, year = {2026}, publisher = {Hugging Face}, url = {https://huggingface.co/datasets/solsticestudioai/nemesis-cyber-pack} } ```