Replace dataset with 41.6M-pipeline output (UC fixes) — phase 1
Browse filesPhase 1 of UC-feedback regeneration:
- New README with full ground-truth, scoring, and MITRE documentation
- Delete stale signal shards (21 new shards uploaded in phase 2)
- Delete placeholder graph.graphml + graph.json (replaced by per-incident GraphMLs)
- New nodes.jsonl (44,717 nodes), attack_reports.jsonl (12,361 reports)
- .gitattributes +1 -0
- README.md +126 -55
- graph/{graph.graphml → attack_reports.jsonl} +2 -2
- graph/graph.json +0 -3
- graph/metadata.json +0 -17
- graph/nodes.jsonl +0 -0
- signals/metadata.json +154 -1
- signals/signals-00021.parquet +0 -3
- signals/signals-00022.parquet +0 -3
- signals/signals-00023.parquet +0 -3
- signals/signals-00024.parquet +0 -3
- signals/signals-00025.parquet +0 -3
- signals/signals-00026.parquet +0 -3
- signals/signals-00027.parquet +0 -3
- signals/signals-00028.parquet +0 -3
- signals/signals-00029.parquet +0 -3
- signals/signals-00030.parquet +0 -3
- signals/signals-00031.parquet +0 -3
- signals/signals-00032.parquet +0 -3
- signals/signals-00033.parquet +0 -3
- signals/signals-00034.parquet +0 -3
- signals/signals-00035.parquet +0 -3
- signals/signals-00036.parquet +0 -3
- signals/signals-00037.parquet +0 -3
- signals/signals-00038.parquet +0 -3
- signals/signals-00039.parquet +0 -3
- signals/signals-00040.parquet +0 -3
- signals/signals-00041.parquet +0 -3
- signals/signals-00042.parquet +0 -3
- signals/signals-00043.parquet +0 -3
- signals/signals-00044.parquet +0 -3
- signals/signals-00045.parquet +0 -3
- signals/signals-00046.parquet +0 -3
- signals/signals-00047.parquet +0 -3
- signals/signals-00048.parquet +0 -3
- signals/signals-00049.parquet +0 -3
- signals/signals-00050.parquet +0 -3
- signals/signals-00051.parquet +0 -3
- signals/signals-00052.parquet +0 -3
- signals/signals-00053.parquet +0 -3
- signals/signals-00054.parquet +0 -3
- signals/signals-00055.parquet +0 -3
- signals/signals-00056.parquet +0 -3
- signals/signals-00057.parquet +0 -3
.gitattributes
CHANGED
|
@@ -62,3 +62,4 @@ graph/edges.jsonl filter=lfs diff=lfs merge=lfs -text
|
|
| 62 |
graph/graph.graphml filter=lfs diff=lfs merge=lfs -text
|
| 63 |
graph/graph.json filter=lfs diff=lfs merge=lfs -text
|
| 64 |
graph/incidents.jsonl filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 62 |
graph/graph.graphml filter=lfs diff=lfs merge=lfs -text
|
| 63 |
graph/graph.json filter=lfs diff=lfs merge=lfs -text
|
| 64 |
graph/incidents.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 65 |
+
graph/attack_reports.jsonl filter=lfs diff=lfs merge=lfs -text
|
README.md
CHANGED
|
@@ -18,12 +18,12 @@ tags:
|
|
| 18 |
- labeled-dataset
|
| 19 |
- lead-rules
|
| 20 |
size_categories:
|
| 21 |
-
-
|
| 22 |
dataset_info:
|
| 23 |
- config_name: signals
|
| 24 |
splits:
|
| 25 |
- name: train
|
| 26 |
-
num_examples:
|
| 27 |
configs:
|
| 28 |
- config_name: signals
|
| 29 |
data_files:
|
|
@@ -43,15 +43,15 @@ configs:
|
|
| 43 |
path: graph/incidents.jsonl
|
| 44 |
---
|
| 45 |
|
| 46 |
-
# WitFoo Precinct6 Cybersecurity Dataset (
|
| 47 |
|
| 48 |
## Overview
|
| 49 |
|
| 50 |
-
A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by [WitFoo Precinct](https://www.witfoo.com/) version 6.x. This dataset contains **
|
| 51 |
|
| 52 |
**Available in two sizes:**
|
| 53 |
-
- [`witfoo/precinct6-cybersecurity`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity) —
|
| 54 |
-
- [`witfoo/precinct6-cybersecurity-100m`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m) — **
|
| 55 |
|
| 56 |
**Generate your own:** WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: [`witfoo/dataset-from-precinct6`](https://github.com/witfoo/dataset-from-precinct6)
|
| 57 |
|
|
@@ -67,23 +67,22 @@ This dataset is designed to support research in:
|
|
| 67 |
```python
|
| 68 |
from datasets import load_dataset
|
| 69 |
|
| 70 |
-
# Load flat signal logs (
|
| 71 |
signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
|
| 72 |
|
| 73 |
-
# Find malicious events
|
| 74 |
-
|
|
|
|
|
|
|
| 75 |
|
| 76 |
-
# Find suspicious events
|
| 77 |
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
|
| 78 |
|
| 79 |
-
#
|
| 80 |
-
cisco_events = signals.filter(lambda x: x["vendor_name"] == "Cisco")
|
| 81 |
-
|
| 82 |
-
# Load provenance graph
|
| 83 |
nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
|
| 84 |
edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
|
| 85 |
|
| 86 |
-
# Load full incident graphs
|
| 87 |
incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
|
| 88 |
```
|
| 89 |
|
|
@@ -91,9 +90,17 @@ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", spl
|
|
| 91 |
|
| 92 |
| Label | Count | Percentage |
|
| 93 |
|-------|-------|------------|
|
| 94 |
-
| `benign` |
|
| 95 |
-
| `malicious` |
|
| 96 |
-
| `suspicious` |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 97 |
|
| 98 |
## Signal Columns
|
| 99 |
|
|
@@ -101,7 +108,7 @@ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", spl
|
|
| 101 |
|--------|------|-------------|
|
| 102 |
| `timestamp` | float | Unix epoch timestamp |
|
| 103 |
| `message_type` | string | Event classification (e.g., `firewall_action`, `account_logon`, `AssumeRole`) |
|
| 104 |
-
| `stream_name` | string | Source product/data stream
|
| 105 |
| `pipeline` | string | Ingestion pipeline |
|
| 106 |
| `src_ip` | string | Source IP (sanitized) |
|
| 107 |
| `dst_ip` | string | Destination IP (sanitized) |
|
|
@@ -116,10 +123,18 @@ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", spl
|
|
| 116 |
| `vendor_code` | string | Vendor-specific event code |
|
| 117 |
| `message_sanitized` | string | Full sanitized raw log message |
|
| 118 |
| `label_binary` | string | `malicious`, `suspicious`, or `benign` |
|
| 119 |
-
| `label_confidence` | float | Confidence score (0.0–1.0) |
|
| 120 |
-
| `
|
|
|
|
|
|
|
|
|
|
| 121 |
| `mo_name` | string | Modus operandi (e.g., `Data Theft`) |
|
| 122 |
| `lifecycle_stage` | string | Kill chain stage (e.g., `initial-compromise`, `complete-mission`) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 123 |
| `matched_rules` | string | JSON array of matched WitFoo lead rule descriptions |
|
| 124 |
| `set_roles` | string | JSON array of classification roles (e.g., `Exploiting Host`, `C2 Server`) |
|
| 125 |
| `product_name` | string | Security product name (e.g., `ASA Firewall`, `Falcon`) |
|
|
@@ -144,62 +159,118 @@ The dataset contains events from **158 security products** across **70+ vendors*
|
|
| 144 |
|
| 145 |
**Three-tier labels** derived from two sources:
|
| 146 |
|
| 147 |
-
- **`malicious`** (
|
| 148 |
-
- **`suspicious`** (
|
| 149 |
-
- **`benign`** (
|
| 150 |
|
| 151 |
-
|
| 152 |
|
| 153 |
-
|
| 154 |
|
| 155 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 156 |
|
| 157 |
-
|
| 158 |
-
|------|----------|-------|
|
| 159 |
-
| Blocked Action | Any firewall block | Exploiting Host → Exploiting Target |
|
| 160 |
-
| ASA Deny | cisco_asa + deny | Exploiting Host → Exploiting Target |
|
| 161 |
-
| Windows Failed Login | Event ID 4625 | Exploiting Target → Exploiting Host |
|
| 162 |
-
| CrowdStrike Detection | CrowdStrike stream | Exploiting Target → Exploiting Host |
|
| 163 |
-
| AWS VPC Reject | VPC flow + REJECT | Exploiting Host → Exploiting Target |
|
| 164 |
-
| Authentication Failure | auth_failure type | Exploiting Host → Exploiting Target |
|
| 165 |
-
| Audit log cleared | Event ID 1102 | Exploiting Target → Exploiting Host |
|
| 166 |
|
| 167 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 168 |
|
| 169 |
-
|
| 170 |
|
| 171 |
-
|
| 172 |
-
|
| 173 |
-
|
| 174 |
-
|
|
|
|
| 175 |
|
| 176 |
-
**
|
| 177 |
|
| 178 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 179 |
|
| 180 |
## Graph Data
|
| 181 |
|
| 182 |
| Component | Count |
|
| 183 |
|-----------|-------|
|
| 184 |
-
| Nodes |
|
| 185 |
-
| Edges |
|
| 186 |
-
| Incidents |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 187 |
|
| 188 |
## Limitations
|
| 189 |
|
| 190 |
-
- **Label imbalance**: 99.
|
| 191 |
-
- **Temporal scope**: July–August 2024
|
| 192 |
-
- **
|
| 193 |
-
- **Shared incidents**:
|
| 194 |
-
- **Sanitization trade-offs**: Some log message detail reduced by PII replacement
|
| 195 |
|
| 196 |
## Citation
|
| 197 |
|
| 198 |
```bibtex
|
| 199 |
-
@dataset{
|
| 200 |
-
title={WitFoo Precinct6 Cybersecurity Dataset (
|
| 201 |
author={WitFoo, Inc.},
|
| 202 |
-
year={
|
| 203 |
url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
|
| 204 |
license={Apache-2.0}
|
| 205 |
}
|
|
|
|
| 18 |
- labeled-dataset
|
| 19 |
- lead-rules
|
| 20 |
size_categories:
|
| 21 |
+
- 10M<n<100M
|
| 22 |
dataset_info:
|
| 23 |
- config_name: signals
|
| 24 |
splits:
|
| 25 |
- name: train
|
| 26 |
+
num_examples: 41658748
|
| 27 |
configs:
|
| 28 |
- config_name: signals
|
| 29 |
data_files:
|
|
|
|
| 43 |
path: graph/incidents.jsonl
|
| 44 |
---
|
| 45 |
|
| 46 |
+
# WitFoo Precinct6 Cybersecurity Dataset (large)
|
| 47 |
|
| 48 |
## Overview
|
| 49 |
|
| 50 |
+
A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by [WitFoo Precinct](https://www.witfoo.com/) version 6.x. This dataset contains **41,658,748 sanitized security events** (signal logs) across 5 organizations and **12,361 incident provenance graphs** (44,717 nodes, 9,494,858 edges).
|
| 51 |
|
| 52 |
**Available in two sizes:**
|
| 53 |
+
- [`witfoo/precinct6-cybersecurity`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity) — 2.1M signals (smaller, faster to load; same incidents and graph methodology)
|
| 54 |
+
- [`witfoo/precinct6-cybersecurity-100m`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m) — **41.6M signals (this dataset)**
|
| 55 |
|
| 56 |
**Generate your own:** WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: [`witfoo/dataset-from-precinct6`](https://github.com/witfoo/dataset-from-precinct6)
|
| 57 |
|
|
|
|
| 67 |
```python
|
| 68 |
from datasets import load_dataset
|
| 69 |
|
| 70 |
+
# Load flat signal logs (41.6M rows across 21 Parquet shards)
|
| 71 |
signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
|
| 72 |
|
| 73 |
+
# Find analyst-confirmed malicious events
|
| 74 |
+
malicious_confirmed = signals.filter(
|
| 75 |
+
lambda x: x["label_binary"] == "malicious" and x["disposition"] == "Disrupted"
|
| 76 |
+
)
|
| 77 |
|
| 78 |
+
# Find suspicious events that matched detection rules but are not in confirmed incidents
|
| 79 |
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
|
| 80 |
|
| 81 |
+
# Load provenance graph (44.7k nodes, 9.5M edges)
|
|
|
|
|
|
|
|
|
|
| 82 |
nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
|
| 83 |
edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
|
| 84 |
|
| 85 |
+
# Load full incident graphs (12,361 incidents with embedded artifacts, leads, frameworks)
|
| 86 |
incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
|
| 87 |
```
|
| 88 |
|
|
|
|
| 90 |
|
| 91 |
| Label | Count | Percentage |
|
| 92 |
|-------|-------|------------|
|
| 93 |
+
| `benign` | 41,447,721 | 99.49% |
|
| 94 |
+
| `malicious` | 148,128 | 0.36% |
|
| 95 |
+
| `suspicious` | 62,899 | 0.15% |
|
| 96 |
+
|
| 97 |
+
Disposition breakdown (the raw Precinct status, exposed for ground-truth stratification — see [Ground Truth](#ground-truth-and-disposition)):
|
| 98 |
+
|
| 99 |
+
| Disposition | Count | Meaning |
|
| 100 |
+
|-------------|-------|---------|
|
| 101 |
+
| `Unprocessed` | 41,575,946 | No analyst review (default state for benign/suspicious + un-reviewed malicious) |
|
| 102 |
+
| `Disrupted` | 82,782 | SOC analyst confirmed and intervened |
|
| 103 |
+
| `Dismissed` | 20 | SOC analyst dismissed |
|
| 104 |
|
| 105 |
## Signal Columns
|
| 106 |
|
|
|
|
| 108 |
|--------|------|-------------|
|
| 109 |
| `timestamp` | float | Unix epoch timestamp |
|
| 110 |
| `message_type` | string | Event classification (e.g., `firewall_action`, `account_logon`, `AssumeRole`) |
|
| 111 |
+
| `stream_name` | string | Source product/data stream |
|
| 112 |
| `pipeline` | string | Ingestion pipeline |
|
| 113 |
| `src_ip` | string | Source IP (sanitized) |
|
| 114 |
| `dst_ip` | string | Destination IP (sanitized) |
|
|
|
|
| 123 |
| `vendor_code` | string | Vendor-specific event code |
|
| 124 |
| `message_sanitized` | string | Full sanitized raw log message |
|
| 125 |
| `label_binary` | string | `malicious`, `suspicious`, or `benign` |
|
| 126 |
+
| `label_confidence` | float | Confidence score (0.0–1.0). See [Scoring](#scoring). |
|
| 127 |
+
| `attack_techniques` | string | JSON array of MITRE ATT&CK technique IDs (e.g., `["T1041","T1567"]`) |
|
| 128 |
+
| `attack_tactics` | string | JSON array of MITRE ATT&CK tactic IDs (`TA0001`-style) |
|
| 129 |
+
| `defense_techniques` | string | JSON array of MITRE D3FEND defense technique IDs |
|
| 130 |
+
| `suspicion_score` | float | WitFoo suspicion score (0.0–1.0). See [Scoring](#scoring). |
|
| 131 |
| `mo_name` | string | Modus operandi (e.g., `Data Theft`) |
|
| 132 |
| `lifecycle_stage` | string | Kill chain stage (e.g., `initial-compromise`, `complete-mission`) |
|
| 133 |
+
| `disposition` | string | Raw Precinct status (`Disrupted`, `Investigating`, `Resolved`, `Dismissed`, `False Positive`, `Unprocessed`) |
|
| 134 |
+
| `disposition_category` | string | Bucketed disposition (`confirmed-malicious`, `false-positive`, `dismissed`, `automated`) |
|
| 135 |
+
| `is_false_positive` | bool | True if SOC analyst marked the incident as a false positive |
|
| 136 |
+
| `status_name` | string | Same as `disposition` (raw Precinct status) |
|
| 137 |
+
| `incident_ids` | string | JSON array of incident UUIDs (empty for benign/suspicious) |
|
| 138 |
| `matched_rules` | string | JSON array of matched WitFoo lead rule descriptions |
|
| 139 |
| `set_roles` | string | JSON array of classification roles (e.g., `Exploiting Host`, `C2 Server`) |
|
| 140 |
| `product_name` | string | Security product name (e.g., `ASA Firewall`, `Falcon`) |
|
|
|
|
| 159 |
|
| 160 |
**Three-tier labels** derived from two sources:
|
| 161 |
|
| 162 |
+
- **`malicious`** (148,128): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
|
| 163 |
+
- **`suspicious`** (62,899): Events matching WitFoo's 261 lead detection rules but not present in confirmed incidents.
|
| 164 |
+
- **`benign`** (41,447,721): Events not matching any detection rules and not in any incident.
|
| 165 |
|
| 166 |
+
### Ground Truth and Disposition
|
| 167 |
|
| 168 |
+
**All labels in this dataset are derived from WitFoo Precinct's automated incident correlation engine — there is no independent, analyst-verified ground truth.** Researchers should treat Precinct's analysis as a strong but imperfect oracle. The `disposition` column lets you assess label quality on a per-record basis:
|
| 169 |
|
| 170 |
+
| `disposition` | Meaning | Confidence in label |
|
| 171 |
+
|---------------|---------|---------------------|
|
| 172 |
+
| `Disrupted` | SOC analyst confirmed the incident and intervened | High — human-confirmed malicious |
|
| 173 |
+
| `Investigating` | SOC analyst is actively investigating | Medium — analyst engaged |
|
| 174 |
+
| `Resolved` | SOC analyst confirmed and resolved | High — human-confirmed malicious |
|
| 175 |
+
| `Dismissed` | SOC analyst dismissed the incident | Negative — analyst rejected |
|
| 176 |
+
| `False Positive` | SOC analyst confirmed false positive | Negative — analyst rejected |
|
| 177 |
+
| `Unprocessed` | Automated detection, no human review | Lower — Precinct-confidence only |
|
| 178 |
|
| 179 |
+
The `disposition_category` column buckets these into four values for easier filtering: `confirmed-malicious`, `false-positive`, `dismissed`, `automated`. For experiments where ground-truth quality matters, restrict to records where `disposition` ∈ {`Disrupted`, `Resolved`} to compare against analyst-confirmed labels. **This dataset has 82,782 records with `Disrupted` status, 20 with `Dismissed`, and the remainder with `Unprocessed` (no analyst review).**
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 180 |
|
| 181 |
+
For benign and suspicious records, `disposition` is `Unprocessed` (no incident association). For malicious records, `disposition` reflects the parent incident's status at extraction time.
|
| 182 |
+
|
| 183 |
+
### Scoring
|
| 184 |
+
|
| 185 |
+
The dataset exposes two related score fields:
|
| 186 |
+
|
| 187 |
+
- **`suspicion_score`** (float, 0.0–1.0) — Precinct's proprietary suspicion score from the parent incident. Populated for malicious records; zero for benign and suspicious. (Previously this column was always `0` — that was a defaulting bug, now fixed.)
|
| 188 |
|
| 189 |
+
- **`label_confidence`** (float, 0.0–1.0) — Confidence in the assigned `label_binary` tier. Computed deterministically from corroborating signal:
|
| 190 |
|
| 191 |
+
| Label | Formula |
|
| 192 |
+
|-------|---------|
|
| 193 |
+
| `malicious` | `max(0.6, suspicion_score)` clamped to 0.95; lowered to 0.3 if `is_false_positive` |
|
| 194 |
+
| `suspicious` | `0.4 + 0.1 × n_matched_rules + 0.05 × n_set_roles`, clamped to [0.5, 0.85] |
|
| 195 |
+
| `benign` | `0.5` (no positive evidence either way) |
|
| 196 |
|
| 197 |
+
Note: `label_confidence` is **not** the probability the activity is malicious — it indicates how much corroborating evidence supports the assigned tier. Source: [`src/precinct6_dataset/label.py`](https://github.com/witfoo/dataset-from-precinct6/blob/main/src/precinct6_dataset/label.py).
|
| 198 |
|
| 199 |
+
### MITRE ATT&CK Mappings
|
| 200 |
+
|
| 201 |
+
Attack technique and tactic labels are derived from three sources, with deduplication:
|
| 202 |
+
|
| 203 |
+
1. **WitFoo set role names** attached to the incident (e.g., `C2 Server` → `TA0011` Command and Control, `T1071` Application Layer Protocol)
|
| 204 |
+
2. **Modus operandi** name on the incident (e.g., `Ransomware` → `TA0001`, `TA0002`, `TA0040`; `T1486` Data Encrypted for Impact)
|
| 205 |
+
3. **Per-product framework data** embedded in `incident.nodes.products.frameworks` (when present)
|
| 206 |
+
|
| 207 |
+
Tactic IDs use the standard MITRE ATT&CK Enterprise format (`TA0001` through `TA0043`). Technique IDs are top-level techniques representing the most likely category for a given role. Researchers wanting precise per-event technique attribution should treat these as priors. Full mapping tables in [`src/precinct6_dataset/mitre_mapping.py`](https://github.com/witfoo/dataset-from-precinct6/blob/main/src/precinct6_dataset/mitre_mapping.py).
|
| 208 |
+
|
| 209 |
+
**Per-edge/per-node attribution in graph output:** `attack_tactics`, `attack_techniques`, `set_roles`, `lifecycle_stage`, `label_binary`, `label_confidence`, `suspicion_score`, `disposition` are attached at the **edge** level in `edges.jsonl` and in per-incident GraphML files. Nodes in `incidents.jsonl` carry their own `sets` and `products` dicts with per-entity information.
|
| 210 |
|
| 211 |
## Graph Data
|
| 212 |
|
| 213 |
| Component | Count |
|
| 214 |
|-----------|-------|
|
| 215 |
+
| Nodes (artifact-derived hosts + credentials) | 44,717 |
|
| 216 |
+
| Edges (artifact `EVENT`/`NETWORK_FLOW` + incident `INCIDENT_LINK`) | 9,494,858 |
|
| 217 |
+
| Incidents | 12,361 |
|
| 218 |
+
|
| 219 |
+
Per-edge labels in `edges.jsonl` include `attack_techniques`, `attack_tactics`, `set_roles`, `lifecycle_stage`, `disposition`, `mo_name`, `suspicion_score`, `incident_id` (for INCIDENT_LINK edges).
|
| 220 |
+
|
| 221 |
+
## Attack Reports
|
| 222 |
+
|
| 223 |
+
`graph/attack_reports.jsonl` contains one natural-language threat-hunting report per incident (**12,361 reports**). Each report is deterministically composed from structured incident metadata (modus operandi, set roles, lead descriptions, MITRE mappings, timestamps) and explicitly states that it **reflects Precinct's automated correlation engine output, not an independent threat-hunting investigation**.
|
| 224 |
+
|
| 225 |
+
Each record contains: `incident_id`, `report_text`, `mo_name`, `suspicion_score`, `disposition`, `attack_techniques`, `attack_tactics`, `lead_count`, `set_role_names`, `matched_rules`, `products_observed`, `lifecycle_stage`, and timing fields.
|
| 226 |
+
|
| 227 |
+
Researchers can audit exactly how each sentence is derived by reading [`src/precinct6_dataset/attack_reports.py`](https://github.com/witfoo/dataset-from-precinct6/blob/main/src/precinct6_dataset/attack_reports.py).
|
| 228 |
+
|
| 229 |
+
## Additional Files
|
| 230 |
+
|
| 231 |
+
- **`signals/signals-NNNNN.parquet`** — 21 Parquet shards (~280 MB each), 2M rows per shard except final shard. Total ~5.9 GB.
|
| 232 |
+
- **`signals/metadata.json`** — Per-shard summary, label/disposition distributions, top message types and streams.
|
| 233 |
+
- **`graph/nodes.jsonl`** — 44,717 graph nodes (hosts + credentials derived from artifact src/dst/username).
|
| 234 |
+
- **`graph/edges.jsonl`** — 9,494,858 graph edges, each with `labels` dict carrying MITRE, disposition, set_roles, etc.
|
| 235 |
+
- **`graph/incidents.jsonl`** — Full incident records (12,361 lines, ~638 MB) with embedded `nodes`, `edges`, `leads`, and framework mappings.
|
| 236 |
+
- **`graph/incidents_graphml/{0-f}/{incident_id}.graphml`** — **12,361 per-incident GraphML files**, sharded into 16 subdirectories by first hex char of the incident UUID (HuggingFace caps directories at 10,000 files). Each file is small (KB-MB) and loadable in Gephi, NetworkX, igraph, or DGL. Ideal for graph-based research where loading the entire dataset is impractical.
|
| 237 |
+
- **`graph/attack_reports.jsonl`** — Natural-language threat-hunting reports (12,361 reports, ~21 MB). See [Attack Reports](#attack-reports).
|
| 238 |
+
- **`reference/lead_rules_catalog.json`** — Complete catalog of 261 WitFoo lead detection rules, 158 security products, 106 classification sets, and 216 stream-to-product mappings.
|
| 239 |
+
|
| 240 |
+
**Note on the artifact-level graph:** This 41.6M-row extraction yielded fewer events than the previously-published 114M version — the difference reflects Cassandra coordinator behaviour during full-partition extraction. Methodology and content fields are otherwise identical to the 2M version.
|
| 241 |
+
|
| 242 |
+
## Sanitization
|
| 243 |
+
|
| 244 |
+
All customer-identifying information has been removed through a comprehensive 4-layer sanitization pipeline. The pipeline is [open source](https://github.com/witfoo/dataset-from-precinct6) under the Apache 2.0 license.
|
| 245 |
+
|
| 246 |
+
1. **Structured field sanitization + Aho-Corasick multi-pattern sweep** — Known fields are replaced with deterministic tokens (IPs → [RFC 5737](https://datatracker.ietf.org/doc/html/rfc5737) ranges, hostnames → `HOST-NNNN`, etc.). Every record is then swept using an Aho-Corasick automaton built from 97,000+ PII registry entries.
|
| 247 |
+
2. **Format-specific log message parsing** — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback.
|
| 248 |
+
3. **Machine learning residual detection** — [Microsoft Presidio](https://microsoft.github.io/presidio/) (spaCy NLP) and [BERT NER](https://huggingface.co/dslim/bert-base-NER) scan for residual PII. New discoveries trigger full re-sanitization.
|
| 249 |
+
4. **Large language model contextual review** — [Claude](https://www.anthropic.com/claude) reviews stratified samples for subtle PII. Findings trigger re-sanitization.
|
| 250 |
+
|
| 251 |
+
The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles. **Final PII registry: 97,046 unique mappings across 13 categories** (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.
|
| 252 |
+
|
| 253 |
+
## Research Context
|
| 254 |
+
|
| 255 |
+
This dataset was produced in collaboration with the University of Canterbury (New Zealand) Computer Science and Software Engineering department for two research projects:
|
| 256 |
+
- **AI Cyber-Security Battle Simulator** — Improving CybORG with realistic IDS observations, graph-based defense policies, and AI-driven attacker modeling
|
| 257 |
+
- **Intrusion Detection based on Provenance Graphs** — Evaluating reproducibility and generalizability of KnowHow and NodLink detection methods
|
| 258 |
|
| 259 |
## Limitations
|
| 260 |
|
| 261 |
+
- **Label imbalance**: 99.49% benign reflects production SOC reality. Sampling strategies needed for balanced training.
|
| 262 |
+
- **Temporal scope**: July–August 2024.
|
| 263 |
+
- **Ground truth**: All labels derive from Precinct's automated correlation. Use the `disposition` column to stratify by analyst review level.
|
| 264 |
+
- **Shared incidents**: The same 12,361 incidents appear in both the 2M and this dataset (incidents are stored separately from signal data; only the signal sample size differs).
|
| 265 |
+
- **Sanitization trade-offs**: Some log message detail is reduced by PII replacement, particularly in free-text fields.
|
| 266 |
|
| 267 |
## Citation
|
| 268 |
|
| 269 |
```bibtex
|
| 270 |
+
@dataset{witfoo_precinct6_100m_2026,
|
| 271 |
+
title={WitFoo Precinct6 Cybersecurity Dataset (large)},
|
| 272 |
author={WitFoo, Inc.},
|
| 273 |
+
year={2026},
|
| 274 |
url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
|
| 275 |
license={Apache-2.0}
|
| 276 |
}
|
graph/{graph.graphml → attack_reports.jsonl}
RENAMED
|
@@ -1,3 +1,3 @@
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:
|
| 3 |
-
size
|
|
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:580f5c2e77fabd4c4169179d06cc18dd9539ea2ef78915c120647d54bf08cdb4
|
| 3 |
+
size 21888398
|
graph/graph.json
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:5edb37a47134f03488762eb6883d856e53147733672c825079e6d30c0b03cb9f
|
| 3 |
-
size 18970745
|
|
|
|
|
|
|
|
|
|
|
|
graph/metadata.json
DELETED
|
@@ -1,17 +0,0 @@
|
|
| 1 |
-
{
|
| 2 |
-
"dataset_name": "WitFoo Precinct6 Cybersecurity Dataset",
|
| 3 |
-
"version": "1.0.0",
|
| 4 |
-
"node_count": 23362,
|
| 5 |
-
"edge_count": 32732650,
|
| 6 |
-
"label_distribution": {
|
| 7 |
-
"benign": 31995325,
|
| 8 |
-
"malicious": 125700,
|
| 9 |
-
"suspicious": 611625
|
| 10 |
-
},
|
| 11 |
-
"edge_type_distribution": {
|
| 12 |
-
"EVENT": 32193601,
|
| 13 |
-
"NETWORK_FLOW": 505035,
|
| 14 |
-
"DNS_RESOLVE": 34014
|
| 15 |
-
},
|
| 16 |
-
"incident_count": 10442
|
| 17 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
graph/nodes.jsonl
CHANGED
|
The diff for this file is too large to render.
See raw diff
|
|
|
signals/metadata.json
CHANGED
|
@@ -1 +1,154 @@
|
|
| 1 |
-
{
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"total_records": 41658748,
|
| 3 |
+
"n_shards": 21,
|
| 4 |
+
"total_size_bytes": 6285096828,
|
| 5 |
+
"label_distribution": {
|
| 6 |
+
"benign": 41447721,
|
| 7 |
+
"suspicious": 62899,
|
| 8 |
+
"malicious": 148128
|
| 9 |
+
},
|
| 10 |
+
"disposition_distribution": {
|
| 11 |
+
"Unprocessed": 41575946,
|
| 12 |
+
"Disrupted": 82782,
|
| 13 |
+
"Dismissed": 20
|
| 14 |
+
},
|
| 15 |
+
"top_message_types": {
|
| 16 |
+
"security_audit_event": 9229251,
|
| 17 |
+
"4662": 2812876,
|
| 18 |
+
"5156": 2432714,
|
| 19 |
+
"audit_log": 2118371,
|
| 20 |
+
"4658": 2024740,
|
| 21 |
+
"AssumeRole": 1746338,
|
| 22 |
+
"DescribeInstanceStatus": 1585360,
|
| 23 |
+
"unknown": 1559702,
|
| 24 |
+
"GetLogEvents": 1256453,
|
| 25 |
+
"4656": 1014502,
|
| 26 |
+
"4690": 1013158,
|
| 27 |
+
"DescribeInstances": 794197,
|
| 28 |
+
"DescribeLoadBalancers": 689914,
|
| 29 |
+
"ListClusters": 499015,
|
| 30 |
+
"systemd_event": 458497,
|
| 31 |
+
"DescribeAccountAttributes": 432371,
|
| 32 |
+
"GetBucketAcl": 307794,
|
| 33 |
+
"ListFunctions20150331": 301350,
|
| 34 |
+
"UpdateInstanceInformation": 285744,
|
| 35 |
+
"diagnostic_event": 240546,
|
| 36 |
+
"communication": 233061,
|
| 37 |
+
"DescribeVolumes": 232224,
|
| 38 |
+
"pam_event": 227289,
|
| 39 |
+
"DescribeClusters": 221341,
|
| 40 |
+
"GetBucketLocation": 218321,
|
| 41 |
+
"DescribeVpcs": 218177,
|
| 42 |
+
"GetBucketMetricsConfiguration": 210779,
|
| 43 |
+
"account_logon": 206951,
|
| 44 |
+
"DescribeTargetGroups": 206590,
|
| 45 |
+
"ListStacks": 202445,
|
| 46 |
+
"GetResources": 201427,
|
| 47 |
+
"account_logoff": 199416,
|
| 48 |
+
"DescribeSubnets": 190895,
|
| 49 |
+
"UpdateInstanceAssociationStatus": 185677,
|
| 50 |
+
"DescribeAlarmHistory": 184829,
|
| 51 |
+
"GetSendQuota": 178419,
|
| 52 |
+
"DescribeAccountLimits": 177594,
|
| 53 |
+
"4776": 170092,
|
| 54 |
+
"ListTopics": 168937,
|
| 55 |
+
"DescribeLimits": 162647,
|
| 56 |
+
"ListTables": 156659,
|
| 57 |
+
"access_log": 146831,
|
| 58 |
+
"5158": 143544,
|
| 59 |
+
"18453": 141318,
|
| 60 |
+
"DescribeAddresses": 140900,
|
| 61 |
+
"DescribeAutoScalingGroups": 139013,
|
| 62 |
+
"DescribeImages": 135742,
|
| 63 |
+
"GenerateDataKey": 135246,
|
| 64 |
+
"DescribeInternetGateways": 131041,
|
| 65 |
+
"auth_event": 126943
|
| 66 |
+
},
|
| 67 |
+
"top_streams": {
|
| 68 |
+
"aws_cloudtrail_events": 16087719,
|
| 69 |
+
"microsoft-windows-security-auditing": 10481332,
|
| 70 |
+
"windows_security_audit": 9229251,
|
| 71 |
+
"aws_cloud_trail": 1994628,
|
| 72 |
+
"no_useful_info": 1503924,
|
| 73 |
+
"crond": 432131,
|
| 74 |
+
"sshd": 248142,
|
| 75 |
+
"filebeat_diagnostic": 240546,
|
| 76 |
+
"network_communication": 233061,
|
| 77 |
+
"pam": 227289,
|
| 78 |
+
"mssql$paygsql01": 193458,
|
| 79 |
+
"systemd_logind": 126943,
|
| 80 |
+
"cisco_asa": 99488,
|
| 81 |
+
"linux_audit": 90726,
|
| 82 |
+
"aws_vpc_flow_log": 58162,
|
| 83 |
+
"unknown": 55441,
|
| 84 |
+
"security": 53331,
|
| 85 |
+
"cisco_os": 51551,
|
| 86 |
+
"ad fs auditing": 40738,
|
| 87 |
+
"symantec_sep": 36946,
|
| 88 |
+
"meraki": 36418,
|
| 89 |
+
"ad_audit_plus": 33017,
|
| 90 |
+
"systemd": 26286,
|
| 91 |
+
"service control manager": 23244,
|
| 92 |
+
"pan_firewall": 8298,
|
| 93 |
+
"microsoft-windows-distributedcom": 7754,
|
| 94 |
+
"Integrations Status": 7192,
|
| 95 |
+
"Crowdstrike Asset Inventory": 6994,
|
| 96 |
+
"DUO Asset Inventory": 3767,
|
| 97 |
+
"esent": 3704,
|
| 98 |
+
"generic_log": 3379,
|
| 99 |
+
"directory synchronization": 3121,
|
| 100 |
+
"schannel": 2137,
|
| 101 |
+
"microsoft-windows-security-spp": 2039,
|
| 102 |
+
"Crowdstrike Detection": 1155,
|
| 103 |
+
"mssqlserver": 529,
|
| 104 |
+
"trend micro_deep security manager": 353,
|
| 105 |
+
"sentinelone": 337,
|
| 106 |
+
"microsoft-windows-certificateservicesclient-autoenrollment": 293,
|
| 107 |
+
"meraki_l7_firewall": 292,
|
| 108 |
+
"sqlagent$paygsql01": 264,
|
| 109 |
+
"mssql$microsoft##wid": 251,
|
| 110 |
+
"symantec_dlp": 221,
|
| 111 |
+
"volsnap": 187,
|
| 112 |
+
"vss": 187,
|
| 113 |
+
"nutanix guest agent": 154,
|
| 114 |
+
"vssaudit": 146,
|
| 115 |
+
".net runtime": 135,
|
| 116 |
+
"msiinstaller": 123,
|
| 117 |
+
"adsync": 106
|
| 118 |
+
},
|
| 119 |
+
"schema": [
|
| 120 |
+
"timestamp",
|
| 121 |
+
"message_type",
|
| 122 |
+
"stream_name",
|
| 123 |
+
"pipeline",
|
| 124 |
+
"src_ip",
|
| 125 |
+
"dst_ip",
|
| 126 |
+
"src_port",
|
| 127 |
+
"dst_port",
|
| 128 |
+
"protocol",
|
| 129 |
+
"src_host",
|
| 130 |
+
"dst_host",
|
| 131 |
+
"username",
|
| 132 |
+
"action",
|
| 133 |
+
"severity",
|
| 134 |
+
"vendor_code",
|
| 135 |
+
"message_sanitized",
|
| 136 |
+
"label_binary",
|
| 137 |
+
"label_confidence",
|
| 138 |
+
"attack_techniques",
|
| 139 |
+
"attack_tactics",
|
| 140 |
+
"defense_techniques",
|
| 141 |
+
"mo_name",
|
| 142 |
+
"suspicion_score",
|
| 143 |
+
"lifecycle_stage",
|
| 144 |
+
"disposition",
|
| 145 |
+
"disposition_category",
|
| 146 |
+
"is_false_positive",
|
| 147 |
+
"status_name",
|
| 148 |
+
"incident_ids",
|
| 149 |
+
"matched_rules",
|
| 150 |
+
"set_roles",
|
| 151 |
+
"product_name",
|
| 152 |
+
"vendor_name"
|
| 153 |
+
]
|
| 154 |
+
}
|
signals/signals-00021.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:21aed3c994c3e290162e70798d488896ddd35c28596c9b177e5d2d322fe6d0ff
|
| 3 |
-
size 285954613
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00022.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:3fbe06b82e8f07f3ec57219025142005d11af32e30fe478840d7112eaf861ecf
|
| 3 |
-
size 265645535
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00023.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:2ff9885af81f6b97f4dfc72eab415be5bcd9e97ff00c8ea0a8c485368a4f3a3b
|
| 3 |
-
size 276419241
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00024.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:a94257106280ae37d3c96ebbd6e81b7db84cedc922c63695bbbdfa7aeb31c0f5
|
| 3 |
-
size 270314976
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00025.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:7c45e932af407b45376a7967e14c3f306049b2f590bd6828c2043200f3ef9890
|
| 3 |
-
size 285036377
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00026.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:8f77cfe4e4c2e599cbf467f2e4e37f533a23cbbf0c23f80d7e06289397139b7d
|
| 3 |
-
size 242510347
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00027.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:bd03519e5954ddea3265084f66d3351e0c1f4f505e9fe5ebd43820287c068180
|
| 3 |
-
size 233328615
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00028.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:4a8d2c1c43e766c42be8813dd6d082c31766a2a8d20c69fedffafa693ee0dd11
|
| 3 |
-
size 276191108
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00029.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:30b73e2de95777484c138ca11a4ac3f3e9125d8aab459f7b1137b6846d8c143a
|
| 3 |
-
size 266549570
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00030.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:92ce83f0445df63386845b0d4805f0559112d23db225b2a50aeea510e2e94411
|
| 3 |
-
size 254278628
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00031.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:0db3c72f9e13e2404f89728edcb645ff86af133cc884aa5c220e3d1f641a119d
|
| 3 |
-
size 270284176
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00032.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:a9b1480c33a082389a3823f007acaf0e70dd17a96e4166e593f5089219ae90d1
|
| 3 |
-
size 265532267
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00033.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:1c3d26f709200f7a8c66f398a51af73192d2dd2460ec539bbb0c1ff1cdb67f8c
|
| 3 |
-
size 258276175
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00034.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:b663614771b4561afd795898eb57f2cc5e45ee94af9bf660b5c8d9780a44c43f
|
| 3 |
-
size 219551359
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00035.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:a11ccbf4acdb04ecc271d78d809d7253d0d2238f19c23e619832b900e5f8180c
|
| 3 |
-
size 276046586
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00036.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:a58a511e6902ad103686cba0ddaa60da9919148b7065a69254ae485f2a88618c
|
| 3 |
-
size 269156873
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00037.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:b556afea944da49d31c9c585f62d977642374a0f62a81b18172c384815a0576d
|
| 3 |
-
size 241113201
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00038.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:8fe818e0a050d367a4595ba9f521dad724c3fd9b74bd713b7d86d9eccb90ceac
|
| 3 |
-
size 240215755
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00039.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:49ca4663fb62e44675fa6ab38c1c238cd1d7f077b466709f3b97adb87ce46835
|
| 3 |
-
size 255156153
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00040.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:480b0c85b476752a97bd395ca12067050f857955942346d098d111b7d32b23cf
|
| 3 |
-
size 270293915
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00041.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:108e224805226904376cc5adbf289c3db40ac5c7ccde64e6d24bbc1e0639b971
|
| 3 |
-
size 251485576
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00042.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:228d2a2ab03f7bc3e2021be618536a4e5d65f200a9e4d35c944d815fa1bd317c
|
| 3 |
-
size 286835800
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00043.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:357ef1df64ad269e92b109d0ed122d5abb81315b56ad279004658e677081a73a
|
| 3 |
-
size 279772298
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00044.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:b18ae5e298df11c6a64de9314830dd4abd9dccb860f282454c76a5a7bdffec2a
|
| 3 |
-
size 267775082
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00045.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:5cf5f31f6436160f78990a14001fae6b1509235a2746f02fc64ab46040d8ca15
|
| 3 |
-
size 311080960
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00046.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:88eb798d11a83ee364fadc92ecfbb6e0cedbbb19fac5ca8ae5dc739db8356a93
|
| 3 |
-
size 268043012
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00047.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:5e39ece8193eb94598b52f7e56f0ad55b3e52886ba724526a8bda4c4eecc2d36
|
| 3 |
-
size 285142470
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00048.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:855533d1462a51b0cf06583f956620777ed601a25d63eb20bc98092183aa21bb
|
| 3 |
-
size 260766948
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00049.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:c927860448d3e042c3ec387148ce0db737bd99180ebbd5fb97be0bbe2dc419fa
|
| 3 |
-
size 274281038
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00050.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:dd3c011d29a515dfb8325433a7277c8583cbade8391a79164af4e0788df12734
|
| 3 |
-
size 239211963
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00051.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:b2f1284d927858d60edb15d49e9854e33af072cd291f3a79b932855703fdca73
|
| 3 |
-
size 279500072
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00052.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:878214b04ce61fac1aadfda86d4539c4c88677941516a0e4d1eaae4b962dfd46
|
| 3 |
-
size 258353606
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00053.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:427ba63b259a40b9be2cefbeef3b3cce0aed49fe8bf57d272d2f228d7c34bd2f
|
| 3 |
-
size 275297398
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00054.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:6e554b80c87663118cd2607fe50ea1a403bb5dd0c09b016b3c8095faf91eb78a
|
| 3 |
-
size 286609271
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00055.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:c95b61bf7fff17ac9886fb3e7aa8a341d82bc2e99becf97fc62cd2b56c54968a
|
| 3 |
-
size 206102572
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00056.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:e0b46f276652174ea2c7a56c3dce6885915057bcee10106ba66c704115a66c1e
|
| 3 |
-
size 123998749
|
|
|
|
|
|
|
|
|
|
|
|
signals/signals-00057.parquet
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:e7e4968f997f61561aac3e557c3739268becfeedbc2771049b78ca7061e2f9dd
|
| 3 |
-
size 2438728
|
|
|
|
|
|
|
|
|
|
|
|