f15hb0wn commited on
Commit
734ea32
·
verified ·
1 Parent(s): 09b3216

Replace dataset with 41.6M-pipeline output (UC fixes) — phase 1

Browse files

Phase 1 of UC-feedback regeneration:
- New README with full ground-truth, scoring, and MITRE documentation
- Delete stale signal shards (21 new shards uploaded in phase 2)
- Delete placeholder graph.graphml + graph.json (replaced by per-incident GraphMLs)
- New nodes.jsonl (44,717 nodes), attack_reports.jsonl (12,361 reports)

Files changed (44) hide show
  1. .gitattributes +1 -0
  2. README.md +126 -55
  3. graph/{graph.graphml → attack_reports.jsonl} +2 -2
  4. graph/graph.json +0 -3
  5. graph/metadata.json +0 -17
  6. graph/nodes.jsonl +0 -0
  7. signals/metadata.json +154 -1
  8. signals/signals-00021.parquet +0 -3
  9. signals/signals-00022.parquet +0 -3
  10. signals/signals-00023.parquet +0 -3
  11. signals/signals-00024.parquet +0 -3
  12. signals/signals-00025.parquet +0 -3
  13. signals/signals-00026.parquet +0 -3
  14. signals/signals-00027.parquet +0 -3
  15. signals/signals-00028.parquet +0 -3
  16. signals/signals-00029.parquet +0 -3
  17. signals/signals-00030.parquet +0 -3
  18. signals/signals-00031.parquet +0 -3
  19. signals/signals-00032.parquet +0 -3
  20. signals/signals-00033.parquet +0 -3
  21. signals/signals-00034.parquet +0 -3
  22. signals/signals-00035.parquet +0 -3
  23. signals/signals-00036.parquet +0 -3
  24. signals/signals-00037.parquet +0 -3
  25. signals/signals-00038.parquet +0 -3
  26. signals/signals-00039.parquet +0 -3
  27. signals/signals-00040.parquet +0 -3
  28. signals/signals-00041.parquet +0 -3
  29. signals/signals-00042.parquet +0 -3
  30. signals/signals-00043.parquet +0 -3
  31. signals/signals-00044.parquet +0 -3
  32. signals/signals-00045.parquet +0 -3
  33. signals/signals-00046.parquet +0 -3
  34. signals/signals-00047.parquet +0 -3
  35. signals/signals-00048.parquet +0 -3
  36. signals/signals-00049.parquet +0 -3
  37. signals/signals-00050.parquet +0 -3
  38. signals/signals-00051.parquet +0 -3
  39. signals/signals-00052.parquet +0 -3
  40. signals/signals-00053.parquet +0 -3
  41. signals/signals-00054.parquet +0 -3
  42. signals/signals-00055.parquet +0 -3
  43. signals/signals-00056.parquet +0 -3
  44. signals/signals-00057.parquet +0 -3
.gitattributes CHANGED
@@ -62,3 +62,4 @@ graph/edges.jsonl filter=lfs diff=lfs merge=lfs -text
62
  graph/graph.graphml filter=lfs diff=lfs merge=lfs -text
63
  graph/graph.json filter=lfs diff=lfs merge=lfs -text
64
  graph/incidents.jsonl filter=lfs diff=lfs merge=lfs -text
 
 
62
  graph/graph.graphml filter=lfs diff=lfs merge=lfs -text
63
  graph/graph.json filter=lfs diff=lfs merge=lfs -text
64
  graph/incidents.jsonl filter=lfs diff=lfs merge=lfs -text
65
+ graph/attack_reports.jsonl filter=lfs diff=lfs merge=lfs -text
README.md CHANGED
@@ -18,12 +18,12 @@ tags:
18
  - labeled-dataset
19
  - lead-rules
20
  size_categories:
21
- - 100M<n<1B
22
  dataset_info:
23
  - config_name: signals
24
  splits:
25
  - name: train
26
- num_examples: 114074530
27
  configs:
28
  - config_name: signals
29
  data_files:
@@ -43,15 +43,15 @@ configs:
43
  path: graph/incidents.jsonl
44
  ---
45
 
46
- # WitFoo Precinct6 Cybersecurity Dataset (114M)
47
 
48
  ## Overview
49
 
50
- A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by [WitFoo Precinct](https://www.witfoo.com/) version 6.x. This dataset contains **114 million sanitized security events** (signal logs) and **provenance graphs** (10,442 incident graphs with 23,362 nodes and 32,732,650 edges) from real enterprise network monitoring across 5 organizations.
51
 
52
  **Available in two sizes:**
53
- - [`witfoo/precinct6-cybersecurity`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity) — 2M signals (smaller, faster to load)
54
- - [`witfoo/precinct6-cybersecurity-100m`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m) — **114M signals (this dataset)**
55
 
56
  **Generate your own:** WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: [`witfoo/dataset-from-precinct6`](https://github.com/witfoo/dataset-from-precinct6)
57
 
@@ -67,23 +67,22 @@ This dataset is designed to support research in:
67
  ```python
68
  from datasets import load_dataset
69
 
70
- # Load flat signal logs (114M rows across 58 Parquet shards)
71
  signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
72
 
73
- # Find malicious events (from confirmed incidents)
74
- malicious = signals.filter(lambda x: x["label_binary"] == "malicious")
 
 
75
 
76
- # Find suspicious events (matched detection rules)
77
  suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
78
 
79
- # Query by product/vendor
80
- cisco_events = signals.filter(lambda x: x["vendor_name"] == "Cisco")
81
-
82
- # Load provenance graph
83
  nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
84
  edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
85
 
86
- # Load full incident graphs
87
  incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
88
  ```
89
 
@@ -91,9 +90,17 @@ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", spl
91
 
92
  | Label | Count | Percentage |
93
  |-------|-------|------------|
94
- | `benign` | 113,326,050 | 99.34% |
95
- | `malicious` | 125,780 | 0.11% |
96
- | `suspicious` | 622,700 | 0.55% |
 
 
 
 
 
 
 
 
97
 
98
  ## Signal Columns
99
 
@@ -101,7 +108,7 @@ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", spl
101
  |--------|------|-------------|
102
  | `timestamp` | float | Unix epoch timestamp |
103
  | `message_type` | string | Event classification (e.g., `firewall_action`, `account_logon`, `AssumeRole`) |
104
- | `stream_name` | string | Source product/data stream (see Source Products below) |
105
  | `pipeline` | string | Ingestion pipeline |
106
  | `src_ip` | string | Source IP (sanitized) |
107
  | `dst_ip` | string | Destination IP (sanitized) |
@@ -116,10 +123,18 @@ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", spl
116
  | `vendor_code` | string | Vendor-specific event code |
117
  | `message_sanitized` | string | Full sanitized raw log message |
118
  | `label_binary` | string | `malicious`, `suspicious`, or `benign` |
119
- | `label_confidence` | float | Confidence score (0.0–1.0) |
120
- | `suspicion_score` | float | WitFoo suspicion score (0.0–1.0) |
 
 
 
121
  | `mo_name` | string | Modus operandi (e.g., `Data Theft`) |
122
  | `lifecycle_stage` | string | Kill chain stage (e.g., `initial-compromise`, `complete-mission`) |
 
 
 
 
 
123
  | `matched_rules` | string | JSON array of matched WitFoo lead rule descriptions |
124
  | `set_roles` | string | JSON array of classification roles (e.g., `Exploiting Host`, `C2 Server`) |
125
  | `product_name` | string | Security product name (e.g., `ASA Firewall`, `Falcon`) |
@@ -144,62 +159,118 @@ The dataset contains events from **158 security products** across **70+ vendors*
144
 
145
  **Three-tier labels** derived from two sources:
146
 
147
- - **`malicious`** (125,780): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
148
- - **`suspicious`** (622,700): Events matching WitFoo's 261 lead detection rules (e.g., "ASA Deny", "Windows Failed Login", "CrowdStrike Detection") but not in confirmed incidents.
149
- - **`benign`** (113,326,050): Events not matching any detection rules and not in any incident.
150
 
151
- The `matched_rules` column shows which detection rules matched. The `set_roles` column shows WitFoo classification roles (Exploiting Host, C2 Server, Staging Target, etc.).
152
 
153
- ## Lead Detection Rules
154
 
155
- 261 rules included in `reference/lead_rules_catalog.json`. Examples:
 
 
 
 
 
 
 
156
 
157
- | Rule | Criteria | Roles |
158
- |------|----------|-------|
159
- | Blocked Action | Any firewall block | Exploiting Host → Exploiting Target |
160
- | ASA Deny | cisco_asa + deny | Exploiting Host → Exploiting Target |
161
- | Windows Failed Login | Event ID 4625 | Exploiting Target → Exploiting Host |
162
- | CrowdStrike Detection | CrowdStrike stream | Exploiting Target → Exploiting Host |
163
- | AWS VPC Reject | VPC flow + REJECT | Exploiting Host → Exploiting Target |
164
- | Authentication Failure | auth_failure type | Exploiting Host → Exploiting Target |
165
- | Audit log cleared | Event ID 1102 | Exploiting Target → Exploiting Host |
166
 
167
- ## Sanitization
 
 
 
 
 
 
168
 
169
- All customer-identifying information has been removed through a comprehensive, iterative four-layer sanitization pipeline. Quality was prioritized over processing speed. The pipeline is [open source](https://github.com/witfoo/dataset-from-precinct6) under the Apache 2.0 license.
170
 
171
- 1. **Structured field sanitization + Aho-Corasick multi-pattern sweep** — Known fields are replaced with deterministic tokens (IPs to [RFC 5737](https://datatracker.ietf.org/doc/html/rfc5737) ranges, hostnames to `HOST-NNNN`, etc.). Every record is then swept using an [Aho-Corasick automaton](https://en.wikipedia.org/wiki/Aho%E2%80%93Corasick_algorithm) built from all 302,000+ registry entries to catch PII in unexpected contexts. Product identifiers are explicitly protected from the sweep.
172
- 2. **Format-specific log message parsing** — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback — sanitizing PII within structured fields like XML elements, nested JSON, and CSV columns.
173
- 3. **Machine learning residual detection** — [Microsoft Presidio](https://microsoft.github.io/presidio/) (spaCy NLP) and [BERT NER](https://huggingface.co/dslim/bert-base-NER) scan sanitized records for residual PII that pattern-based approaches miss. New discoveries trigger full re-sanitization.
174
- 4. **Large language model contextual review** — [Claude](https://www.anthropic.com/claude) reviews stratified samples for subtle PII: embedded org names, internal hostnames revealing organizational structure, employee names in file paths, AD group names, and geographic identifiers. Findings trigger re-sanitization.
 
175
 
176
- **Iterative convergence:** The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles across the complete dataset. Cycles repeat until near-zero new discoveries.
177
 
178
- **Final PII registry:** ~302,000 unique mappings across 14 categories (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.
 
 
 
 
 
 
 
 
 
 
179
 
180
  ## Graph Data
181
 
182
  | Component | Count |
183
  |-----------|-------|
184
- | Nodes | 23,362 |
185
- | Edges | 32,732,650 |
186
- | Incidents | 10,442 (Data Theft: 10,441, Phishing: 1) |
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
187
 
188
  ## Limitations
189
 
190
- - **Label imbalance**: 99.77% benign reflects production SOC reality. Sampling strategies needed for balanced training.
191
- - **Temporal scope**: July–August 2024
192
- - **Sanitization**: ~302,000 PII registry entries used for consistent replacement across all records
193
- - **Shared incidents**: Same 10,442 incidents appear in both 2M and 114M datasets
194
- - **Sanitization trade-offs**: Some log message detail reduced by PII replacement
195
 
196
  ## Citation
197
 
198
  ```bibtex
199
- @dataset{witfoo_precinct6_100m_2025,
200
- title={WitFoo Precinct6 Cybersecurity Dataset (114M)},
201
  author={WitFoo, Inc.},
202
- year={2025},
203
  url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
204
  license={Apache-2.0}
205
  }
 
18
  - labeled-dataset
19
  - lead-rules
20
  size_categories:
21
+ - 10M<n<100M
22
  dataset_info:
23
  - config_name: signals
24
  splits:
25
  - name: train
26
+ num_examples: 41658748
27
  configs:
28
  - config_name: signals
29
  data_files:
 
43
  path: graph/incidents.jsonl
44
  ---
45
 
46
+ # WitFoo Precinct6 Cybersecurity Dataset (large)
47
 
48
  ## Overview
49
 
50
+ A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by [WitFoo Precinct](https://www.witfoo.com/) version 6.x. This dataset contains **41,658,748 sanitized security events** (signal logs) across 5 organizations and **12,361 incident provenance graphs** (44,717 nodes, 9,494,858 edges).
51
 
52
  **Available in two sizes:**
53
+ - [`witfoo/precinct6-cybersecurity`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity) — 2.1M signals (smaller, faster to load; same incidents and graph methodology)
54
+ - [`witfoo/precinct6-cybersecurity-100m`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m) — **41.6M signals (this dataset)**
55
 
56
  **Generate your own:** WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: [`witfoo/dataset-from-precinct6`](https://github.com/witfoo/dataset-from-precinct6)
57
 
 
67
  ```python
68
  from datasets import load_dataset
69
 
70
+ # Load flat signal logs (41.6M rows across 21 Parquet shards)
71
  signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
72
 
73
+ # Find analyst-confirmed malicious events
74
+ malicious_confirmed = signals.filter(
75
+ lambda x: x["label_binary"] == "malicious" and x["disposition"] == "Disrupted"
76
+ )
77
 
78
+ # Find suspicious events that matched detection rules but are not in confirmed incidents
79
  suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
80
 
81
+ # Load provenance graph (44.7k nodes, 9.5M edges)
 
 
 
82
  nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
83
  edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
84
 
85
+ # Load full incident graphs (12,361 incidents with embedded artifacts, leads, frameworks)
86
  incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
87
  ```
88
 
 
90
 
91
  | Label | Count | Percentage |
92
  |-------|-------|------------|
93
+ | `benign` | 41,447,721 | 99.49% |
94
+ | `malicious` | 148,128 | 0.36% |
95
+ | `suspicious` | 62,899 | 0.15% |
96
+
97
+ Disposition breakdown (the raw Precinct status, exposed for ground-truth stratification — see [Ground Truth](#ground-truth-and-disposition)):
98
+
99
+ | Disposition | Count | Meaning |
100
+ |-------------|-------|---------|
101
+ | `Unprocessed` | 41,575,946 | No analyst review (default state for benign/suspicious + un-reviewed malicious) |
102
+ | `Disrupted` | 82,782 | SOC analyst confirmed and intervened |
103
+ | `Dismissed` | 20 | SOC analyst dismissed |
104
 
105
  ## Signal Columns
106
 
 
108
  |--------|------|-------------|
109
  | `timestamp` | float | Unix epoch timestamp |
110
  | `message_type` | string | Event classification (e.g., `firewall_action`, `account_logon`, `AssumeRole`) |
111
+ | `stream_name` | string | Source product/data stream |
112
  | `pipeline` | string | Ingestion pipeline |
113
  | `src_ip` | string | Source IP (sanitized) |
114
  | `dst_ip` | string | Destination IP (sanitized) |
 
123
  | `vendor_code` | string | Vendor-specific event code |
124
  | `message_sanitized` | string | Full sanitized raw log message |
125
  | `label_binary` | string | `malicious`, `suspicious`, or `benign` |
126
+ | `label_confidence` | float | Confidence score (0.0–1.0). See [Scoring](#scoring). |
127
+ | `attack_techniques` | string | JSON array of MITRE ATT&CK technique IDs (e.g., `["T1041","T1567"]`) |
128
+ | `attack_tactics` | string | JSON array of MITRE ATT&CK tactic IDs (`TA0001`-style) |
129
+ | `defense_techniques` | string | JSON array of MITRE D3FEND defense technique IDs |
130
+ | `suspicion_score` | float | WitFoo suspicion score (0.0–1.0). See [Scoring](#scoring). |
131
  | `mo_name` | string | Modus operandi (e.g., `Data Theft`) |
132
  | `lifecycle_stage` | string | Kill chain stage (e.g., `initial-compromise`, `complete-mission`) |
133
+ | `disposition` | string | Raw Precinct status (`Disrupted`, `Investigating`, `Resolved`, `Dismissed`, `False Positive`, `Unprocessed`) |
134
+ | `disposition_category` | string | Bucketed disposition (`confirmed-malicious`, `false-positive`, `dismissed`, `automated`) |
135
+ | `is_false_positive` | bool | True if SOC analyst marked the incident as a false positive |
136
+ | `status_name` | string | Same as `disposition` (raw Precinct status) |
137
+ | `incident_ids` | string | JSON array of incident UUIDs (empty for benign/suspicious) |
138
  | `matched_rules` | string | JSON array of matched WitFoo lead rule descriptions |
139
  | `set_roles` | string | JSON array of classification roles (e.g., `Exploiting Host`, `C2 Server`) |
140
  | `product_name` | string | Security product name (e.g., `ASA Firewall`, `Falcon`) |
 
159
 
160
  **Three-tier labels** derived from two sources:
161
 
162
+ - **`malicious`** (148,128): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
163
+ - **`suspicious`** (62,899): Events matching WitFoo's 261 lead detection rules but not present in confirmed incidents.
164
+ - **`benign`** (41,447,721): Events not matching any detection rules and not in any incident.
165
 
166
+ ### Ground Truth and Disposition
167
 
168
+ **All labels in this dataset are derived from WitFoo Precinct's automated incident correlation engine — there is no independent, analyst-verified ground truth.** Researchers should treat Precinct's analysis as a strong but imperfect oracle. The `disposition` column lets you assess label quality on a per-record basis:
169
 
170
+ | `disposition` | Meaning | Confidence in label |
171
+ |---------------|---------|---------------------|
172
+ | `Disrupted` | SOC analyst confirmed the incident and intervened | High — human-confirmed malicious |
173
+ | `Investigating` | SOC analyst is actively investigating | Medium — analyst engaged |
174
+ | `Resolved` | SOC analyst confirmed and resolved | High — human-confirmed malicious |
175
+ | `Dismissed` | SOC analyst dismissed the incident | Negative — analyst rejected |
176
+ | `False Positive` | SOC analyst confirmed false positive | Negative — analyst rejected |
177
+ | `Unprocessed` | Automated detection, no human review | Lower — Precinct-confidence only |
178
 
179
+ The `disposition_category` column buckets these into four values for easier filtering: `confirmed-malicious`, `false-positive`, `dismissed`, `automated`. For experiments where ground-truth quality matters, restrict to records where `disposition` ∈ {`Disrupted`, `Resolved`} to compare against analyst-confirmed labels. **This dataset has 82,782 records with `Disrupted` status, 20 with `Dismissed`, and the remainder with `Unprocessed` (no analyst review).**
 
 
 
 
 
 
 
 
180
 
181
+ For benign and suspicious records, `disposition` is `Unprocessed` (no incident association). For malicious records, `disposition` reflects the parent incident's status at extraction time.
182
+
183
+ ### Scoring
184
+
185
+ The dataset exposes two related score fields:
186
+
187
+ - **`suspicion_score`** (float, 0.0–1.0) — Precinct's proprietary suspicion score from the parent incident. Populated for malicious records; zero for benign and suspicious. (Previously this column was always `0` — that was a defaulting bug, now fixed.)
188
 
189
+ - **`label_confidence`** (float, 0.0–1.0) Confidence in the assigned `label_binary` tier. Computed deterministically from corroborating signal:
190
 
191
+ | Label | Formula |
192
+ |-------|---------|
193
+ | `malicious` | `max(0.6, suspicion_score)` clamped to 0.95; lowered to 0.3 if `is_false_positive` |
194
+ | `suspicious` | `0.4 + 0.1 × n_matched_rules + 0.05 × n_set_roles`, clamped to [0.5, 0.85] |
195
+ | `benign` | `0.5` (no positive evidence either way) |
196
 
197
+ Note: `label_confidence` is **not** the probability the activity is malicious it indicates how much corroborating evidence supports the assigned tier. Source: [`src/precinct6_dataset/label.py`](https://github.com/witfoo/dataset-from-precinct6/blob/main/src/precinct6_dataset/label.py).
198
 
199
+ ### MITRE ATT&CK Mappings
200
+
201
+ Attack technique and tactic labels are derived from three sources, with deduplication:
202
+
203
+ 1. **WitFoo set role names** attached to the incident (e.g., `C2 Server` → `TA0011` Command and Control, `T1071` Application Layer Protocol)
204
+ 2. **Modus operandi** name on the incident (e.g., `Ransomware` → `TA0001`, `TA0002`, `TA0040`; `T1486` Data Encrypted for Impact)
205
+ 3. **Per-product framework data** embedded in `incident.nodes.products.frameworks` (when present)
206
+
207
+ Tactic IDs use the standard MITRE ATT&CK Enterprise format (`TA0001` through `TA0043`). Technique IDs are top-level techniques representing the most likely category for a given role. Researchers wanting precise per-event technique attribution should treat these as priors. Full mapping tables in [`src/precinct6_dataset/mitre_mapping.py`](https://github.com/witfoo/dataset-from-precinct6/blob/main/src/precinct6_dataset/mitre_mapping.py).
208
+
209
+ **Per-edge/per-node attribution in graph output:** `attack_tactics`, `attack_techniques`, `set_roles`, `lifecycle_stage`, `label_binary`, `label_confidence`, `suspicion_score`, `disposition` are attached at the **edge** level in `edges.jsonl` and in per-incident GraphML files. Nodes in `incidents.jsonl` carry their own `sets` and `products` dicts with per-entity information.
210
 
211
  ## Graph Data
212
 
213
  | Component | Count |
214
  |-----------|-------|
215
+ | Nodes (artifact-derived hosts + credentials) | 44,717 |
216
+ | Edges (artifact `EVENT`/`NETWORK_FLOW` + incident `INCIDENT_LINK`) | 9,494,858 |
217
+ | Incidents | 12,361 |
218
+
219
+ Per-edge labels in `edges.jsonl` include `attack_techniques`, `attack_tactics`, `set_roles`, `lifecycle_stage`, `disposition`, `mo_name`, `suspicion_score`, `incident_id` (for INCIDENT_LINK edges).
220
+
221
+ ## Attack Reports
222
+
223
+ `graph/attack_reports.jsonl` contains one natural-language threat-hunting report per incident (**12,361 reports**). Each report is deterministically composed from structured incident metadata (modus operandi, set roles, lead descriptions, MITRE mappings, timestamps) and explicitly states that it **reflects Precinct's automated correlation engine output, not an independent threat-hunting investigation**.
224
+
225
+ Each record contains: `incident_id`, `report_text`, `mo_name`, `suspicion_score`, `disposition`, `attack_techniques`, `attack_tactics`, `lead_count`, `set_role_names`, `matched_rules`, `products_observed`, `lifecycle_stage`, and timing fields.
226
+
227
+ Researchers can audit exactly how each sentence is derived by reading [`src/precinct6_dataset/attack_reports.py`](https://github.com/witfoo/dataset-from-precinct6/blob/main/src/precinct6_dataset/attack_reports.py).
228
+
229
+ ## Additional Files
230
+
231
+ - **`signals/signals-NNNNN.parquet`** — 21 Parquet shards (~280 MB each), 2M rows per shard except final shard. Total ~5.9 GB.
232
+ - **`signals/metadata.json`** — Per-shard summary, label/disposition distributions, top message types and streams.
233
+ - **`graph/nodes.jsonl`** — 44,717 graph nodes (hosts + credentials derived from artifact src/dst/username).
234
+ - **`graph/edges.jsonl`** — 9,494,858 graph edges, each with `labels` dict carrying MITRE, disposition, set_roles, etc.
235
+ - **`graph/incidents.jsonl`** — Full incident records (12,361 lines, ~638 MB) with embedded `nodes`, `edges`, `leads`, and framework mappings.
236
+ - **`graph/incidents_graphml/{0-f}/{incident_id}.graphml`** — **12,361 per-incident GraphML files**, sharded into 16 subdirectories by first hex char of the incident UUID (HuggingFace caps directories at 10,000 files). Each file is small (KB-MB) and loadable in Gephi, NetworkX, igraph, or DGL. Ideal for graph-based research where loading the entire dataset is impractical.
237
+ - **`graph/attack_reports.jsonl`** — Natural-language threat-hunting reports (12,361 reports, ~21 MB). See [Attack Reports](#attack-reports).
238
+ - **`reference/lead_rules_catalog.json`** — Complete catalog of 261 WitFoo lead detection rules, 158 security products, 106 classification sets, and 216 stream-to-product mappings.
239
+
240
+ **Note on the artifact-level graph:** This 41.6M-row extraction yielded fewer events than the previously-published 114M version — the difference reflects Cassandra coordinator behaviour during full-partition extraction. Methodology and content fields are otherwise identical to the 2M version.
241
+
242
+ ## Sanitization
243
+
244
+ All customer-identifying information has been removed through a comprehensive 4-layer sanitization pipeline. The pipeline is [open source](https://github.com/witfoo/dataset-from-precinct6) under the Apache 2.0 license.
245
+
246
+ 1. **Structured field sanitization + Aho-Corasick multi-pattern sweep** — Known fields are replaced with deterministic tokens (IPs → [RFC 5737](https://datatracker.ietf.org/doc/html/rfc5737) ranges, hostnames → `HOST-NNNN`, etc.). Every record is then swept using an Aho-Corasick automaton built from 97,000+ PII registry entries.
247
+ 2. **Format-specific log message parsing** — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback.
248
+ 3. **Machine learning residual detection** — [Microsoft Presidio](https://microsoft.github.io/presidio/) (spaCy NLP) and [BERT NER](https://huggingface.co/dslim/bert-base-NER) scan for residual PII. New discoveries trigger full re-sanitization.
249
+ 4. **Large language model contextual review** — [Claude](https://www.anthropic.com/claude) reviews stratified samples for subtle PII. Findings trigger re-sanitization.
250
+
251
+ The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles. **Final PII registry: 97,046 unique mappings across 13 categories** (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.
252
+
253
+ ## Research Context
254
+
255
+ This dataset was produced in collaboration with the University of Canterbury (New Zealand) Computer Science and Software Engineering department for two research projects:
256
+ - **AI Cyber-Security Battle Simulator** — Improving CybORG with realistic IDS observations, graph-based defense policies, and AI-driven attacker modeling
257
+ - **Intrusion Detection based on Provenance Graphs** — Evaluating reproducibility and generalizability of KnowHow and NodLink detection methods
258
 
259
  ## Limitations
260
 
261
+ - **Label imbalance**: 99.49% benign reflects production SOC reality. Sampling strategies needed for balanced training.
262
+ - **Temporal scope**: July–August 2024.
263
+ - **Ground truth**: All labels derive from Precinct's automated correlation. Use the `disposition` column to stratify by analyst review level.
264
+ - **Shared incidents**: The same 12,361 incidents appear in both the 2M and this dataset (incidents are stored separately from signal data; only the signal sample size differs).
265
+ - **Sanitization trade-offs**: Some log message detail is reduced by PII replacement, particularly in free-text fields.
266
 
267
  ## Citation
268
 
269
  ```bibtex
270
+ @dataset{witfoo_precinct6_100m_2026,
271
+ title={WitFoo Precinct6 Cybersecurity Dataset (large)},
272
  author={WitFoo, Inc.},
273
+ year={2026},
274
  url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
275
  license={Apache-2.0}
276
  }
graph/{graph.graphml → attack_reports.jsonl} RENAMED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:883570ee21dfc041d56f8e7a52de46eb251585b9ca956bb1f7d3393c73248114
3
- size 22139401
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:580f5c2e77fabd4c4169179d06cc18dd9539ea2ef78915c120647d54bf08cdb4
3
+ size 21888398
graph/graph.json DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:5edb37a47134f03488762eb6883d856e53147733672c825079e6d30c0b03cb9f
3
- size 18970745
 
 
 
 
graph/metadata.json DELETED
@@ -1,17 +0,0 @@
1
- {
2
- "dataset_name": "WitFoo Precinct6 Cybersecurity Dataset",
3
- "version": "1.0.0",
4
- "node_count": 23362,
5
- "edge_count": 32732650,
6
- "label_distribution": {
7
- "benign": 31995325,
8
- "malicious": 125700,
9
- "suspicious": 611625
10
- },
11
- "edge_type_distribution": {
12
- "EVENT": 32193601,
13
- "NETWORK_FLOW": 505035,
14
- "DNS_RESOLVE": 34014
15
- },
16
- "incident_count": 10442
17
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
graph/nodes.jsonl CHANGED
The diff for this file is too large to render. See raw diff
 
signals/metadata.json CHANGED
@@ -1 +1,154 @@
1
- {"row_count": 114074530, "shard_count": 58, "refresh_trigger": true}
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "total_records": 41658748,
3
+ "n_shards": 21,
4
+ "total_size_bytes": 6285096828,
5
+ "label_distribution": {
6
+ "benign": 41447721,
7
+ "suspicious": 62899,
8
+ "malicious": 148128
9
+ },
10
+ "disposition_distribution": {
11
+ "Unprocessed": 41575946,
12
+ "Disrupted": 82782,
13
+ "Dismissed": 20
14
+ },
15
+ "top_message_types": {
16
+ "security_audit_event": 9229251,
17
+ "4662": 2812876,
18
+ "5156": 2432714,
19
+ "audit_log": 2118371,
20
+ "4658": 2024740,
21
+ "AssumeRole": 1746338,
22
+ "DescribeInstanceStatus": 1585360,
23
+ "unknown": 1559702,
24
+ "GetLogEvents": 1256453,
25
+ "4656": 1014502,
26
+ "4690": 1013158,
27
+ "DescribeInstances": 794197,
28
+ "DescribeLoadBalancers": 689914,
29
+ "ListClusters": 499015,
30
+ "systemd_event": 458497,
31
+ "DescribeAccountAttributes": 432371,
32
+ "GetBucketAcl": 307794,
33
+ "ListFunctions20150331": 301350,
34
+ "UpdateInstanceInformation": 285744,
35
+ "diagnostic_event": 240546,
36
+ "communication": 233061,
37
+ "DescribeVolumes": 232224,
38
+ "pam_event": 227289,
39
+ "DescribeClusters": 221341,
40
+ "GetBucketLocation": 218321,
41
+ "DescribeVpcs": 218177,
42
+ "GetBucketMetricsConfiguration": 210779,
43
+ "account_logon": 206951,
44
+ "DescribeTargetGroups": 206590,
45
+ "ListStacks": 202445,
46
+ "GetResources": 201427,
47
+ "account_logoff": 199416,
48
+ "DescribeSubnets": 190895,
49
+ "UpdateInstanceAssociationStatus": 185677,
50
+ "DescribeAlarmHistory": 184829,
51
+ "GetSendQuota": 178419,
52
+ "DescribeAccountLimits": 177594,
53
+ "4776": 170092,
54
+ "ListTopics": 168937,
55
+ "DescribeLimits": 162647,
56
+ "ListTables": 156659,
57
+ "access_log": 146831,
58
+ "5158": 143544,
59
+ "18453": 141318,
60
+ "DescribeAddresses": 140900,
61
+ "DescribeAutoScalingGroups": 139013,
62
+ "DescribeImages": 135742,
63
+ "GenerateDataKey": 135246,
64
+ "DescribeInternetGateways": 131041,
65
+ "auth_event": 126943
66
+ },
67
+ "top_streams": {
68
+ "aws_cloudtrail_events": 16087719,
69
+ "microsoft-windows-security-auditing": 10481332,
70
+ "windows_security_audit": 9229251,
71
+ "aws_cloud_trail": 1994628,
72
+ "no_useful_info": 1503924,
73
+ "crond": 432131,
74
+ "sshd": 248142,
75
+ "filebeat_diagnostic": 240546,
76
+ "network_communication": 233061,
77
+ "pam": 227289,
78
+ "mssql$paygsql01": 193458,
79
+ "systemd_logind": 126943,
80
+ "cisco_asa": 99488,
81
+ "linux_audit": 90726,
82
+ "aws_vpc_flow_log": 58162,
83
+ "unknown": 55441,
84
+ "security": 53331,
85
+ "cisco_os": 51551,
86
+ "ad fs auditing": 40738,
87
+ "symantec_sep": 36946,
88
+ "meraki": 36418,
89
+ "ad_audit_plus": 33017,
90
+ "systemd": 26286,
91
+ "service control manager": 23244,
92
+ "pan_firewall": 8298,
93
+ "microsoft-windows-distributedcom": 7754,
94
+ "Integrations Status": 7192,
95
+ "Crowdstrike Asset Inventory": 6994,
96
+ "DUO Asset Inventory": 3767,
97
+ "esent": 3704,
98
+ "generic_log": 3379,
99
+ "directory synchronization": 3121,
100
+ "schannel": 2137,
101
+ "microsoft-windows-security-spp": 2039,
102
+ "Crowdstrike Detection": 1155,
103
+ "mssqlserver": 529,
104
+ "trend micro_deep security manager": 353,
105
+ "sentinelone": 337,
106
+ "microsoft-windows-certificateservicesclient-autoenrollment": 293,
107
+ "meraki_l7_firewall": 292,
108
+ "sqlagent$paygsql01": 264,
109
+ "mssql$microsoft##wid": 251,
110
+ "symantec_dlp": 221,
111
+ "volsnap": 187,
112
+ "vss": 187,
113
+ "nutanix guest agent": 154,
114
+ "vssaudit": 146,
115
+ ".net runtime": 135,
116
+ "msiinstaller": 123,
117
+ "adsync": 106
118
+ },
119
+ "schema": [
120
+ "timestamp",
121
+ "message_type",
122
+ "stream_name",
123
+ "pipeline",
124
+ "src_ip",
125
+ "dst_ip",
126
+ "src_port",
127
+ "dst_port",
128
+ "protocol",
129
+ "src_host",
130
+ "dst_host",
131
+ "username",
132
+ "action",
133
+ "severity",
134
+ "vendor_code",
135
+ "message_sanitized",
136
+ "label_binary",
137
+ "label_confidence",
138
+ "attack_techniques",
139
+ "attack_tactics",
140
+ "defense_techniques",
141
+ "mo_name",
142
+ "suspicion_score",
143
+ "lifecycle_stage",
144
+ "disposition",
145
+ "disposition_category",
146
+ "is_false_positive",
147
+ "status_name",
148
+ "incident_ids",
149
+ "matched_rules",
150
+ "set_roles",
151
+ "product_name",
152
+ "vendor_name"
153
+ ]
154
+ }
signals/signals-00021.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:21aed3c994c3e290162e70798d488896ddd35c28596c9b177e5d2d322fe6d0ff
3
- size 285954613
 
 
 
 
signals/signals-00022.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:3fbe06b82e8f07f3ec57219025142005d11af32e30fe478840d7112eaf861ecf
3
- size 265645535
 
 
 
 
signals/signals-00023.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:2ff9885af81f6b97f4dfc72eab415be5bcd9e97ff00c8ea0a8c485368a4f3a3b
3
- size 276419241
 
 
 
 
signals/signals-00024.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:a94257106280ae37d3c96ebbd6e81b7db84cedc922c63695bbbdfa7aeb31c0f5
3
- size 270314976
 
 
 
 
signals/signals-00025.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:7c45e932af407b45376a7967e14c3f306049b2f590bd6828c2043200f3ef9890
3
- size 285036377
 
 
 
 
signals/signals-00026.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:8f77cfe4e4c2e599cbf467f2e4e37f533a23cbbf0c23f80d7e06289397139b7d
3
- size 242510347
 
 
 
 
signals/signals-00027.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:bd03519e5954ddea3265084f66d3351e0c1f4f505e9fe5ebd43820287c068180
3
- size 233328615
 
 
 
 
signals/signals-00028.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:4a8d2c1c43e766c42be8813dd6d082c31766a2a8d20c69fedffafa693ee0dd11
3
- size 276191108
 
 
 
 
signals/signals-00029.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:30b73e2de95777484c138ca11a4ac3f3e9125d8aab459f7b1137b6846d8c143a
3
- size 266549570
 
 
 
 
signals/signals-00030.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:92ce83f0445df63386845b0d4805f0559112d23db225b2a50aeea510e2e94411
3
- size 254278628
 
 
 
 
signals/signals-00031.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:0db3c72f9e13e2404f89728edcb645ff86af133cc884aa5c220e3d1f641a119d
3
- size 270284176
 
 
 
 
signals/signals-00032.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:a9b1480c33a082389a3823f007acaf0e70dd17a96e4166e593f5089219ae90d1
3
- size 265532267
 
 
 
 
signals/signals-00033.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:1c3d26f709200f7a8c66f398a51af73192d2dd2460ec539bbb0c1ff1cdb67f8c
3
- size 258276175
 
 
 
 
signals/signals-00034.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:b663614771b4561afd795898eb57f2cc5e45ee94af9bf660b5c8d9780a44c43f
3
- size 219551359
 
 
 
 
signals/signals-00035.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:a11ccbf4acdb04ecc271d78d809d7253d0d2238f19c23e619832b900e5f8180c
3
- size 276046586
 
 
 
 
signals/signals-00036.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:a58a511e6902ad103686cba0ddaa60da9919148b7065a69254ae485f2a88618c
3
- size 269156873
 
 
 
 
signals/signals-00037.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:b556afea944da49d31c9c585f62d977642374a0f62a81b18172c384815a0576d
3
- size 241113201
 
 
 
 
signals/signals-00038.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:8fe818e0a050d367a4595ba9f521dad724c3fd9b74bd713b7d86d9eccb90ceac
3
- size 240215755
 
 
 
 
signals/signals-00039.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:49ca4663fb62e44675fa6ab38c1c238cd1d7f077b466709f3b97adb87ce46835
3
- size 255156153
 
 
 
 
signals/signals-00040.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:480b0c85b476752a97bd395ca12067050f857955942346d098d111b7d32b23cf
3
- size 270293915
 
 
 
 
signals/signals-00041.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:108e224805226904376cc5adbf289c3db40ac5c7ccde64e6d24bbc1e0639b971
3
- size 251485576
 
 
 
 
signals/signals-00042.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:228d2a2ab03f7bc3e2021be618536a4e5d65f200a9e4d35c944d815fa1bd317c
3
- size 286835800
 
 
 
 
signals/signals-00043.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:357ef1df64ad269e92b109d0ed122d5abb81315b56ad279004658e677081a73a
3
- size 279772298
 
 
 
 
signals/signals-00044.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:b18ae5e298df11c6a64de9314830dd4abd9dccb860f282454c76a5a7bdffec2a
3
- size 267775082
 
 
 
 
signals/signals-00045.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:5cf5f31f6436160f78990a14001fae6b1509235a2746f02fc64ab46040d8ca15
3
- size 311080960
 
 
 
 
signals/signals-00046.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:88eb798d11a83ee364fadc92ecfbb6e0cedbbb19fac5ca8ae5dc739db8356a93
3
- size 268043012
 
 
 
 
signals/signals-00047.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:5e39ece8193eb94598b52f7e56f0ad55b3e52886ba724526a8bda4c4eecc2d36
3
- size 285142470
 
 
 
 
signals/signals-00048.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:855533d1462a51b0cf06583f956620777ed601a25d63eb20bc98092183aa21bb
3
- size 260766948
 
 
 
 
signals/signals-00049.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:c927860448d3e042c3ec387148ce0db737bd99180ebbd5fb97be0bbe2dc419fa
3
- size 274281038
 
 
 
 
signals/signals-00050.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:dd3c011d29a515dfb8325433a7277c8583cbade8391a79164af4e0788df12734
3
- size 239211963
 
 
 
 
signals/signals-00051.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:b2f1284d927858d60edb15d49e9854e33af072cd291f3a79b932855703fdca73
3
- size 279500072
 
 
 
 
signals/signals-00052.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:878214b04ce61fac1aadfda86d4539c4c88677941516a0e4d1eaae4b962dfd46
3
- size 258353606
 
 
 
 
signals/signals-00053.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:427ba63b259a40b9be2cefbeef3b3cce0aed49fe8bf57d272d2f228d7c34bd2f
3
- size 275297398
 
 
 
 
signals/signals-00054.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:6e554b80c87663118cd2607fe50ea1a403bb5dd0c09b016b3c8095faf91eb78a
3
- size 286609271
 
 
 
 
signals/signals-00055.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:c95b61bf7fff17ac9886fb3e7aa8a341d82bc2e99becf97fc62cd2b56c54968a
3
- size 206102572
 
 
 
 
signals/signals-00056.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:e0b46f276652174ea2c7a56c3dce6885915057bcee10106ba66c704115a66c1e
3
- size 123998749
 
 
 
 
signals/signals-00057.parquet DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:e7e4968f997f61561aac3e557c3739268becfeedbc2771049b78ca7061e2f9dd
3
- size 2438728