bijaye f15hb0wn commited on
Commit
ce350bb
·
0 Parent(s):

Duplicate from witfoo/precinct6-cybersecurity-100m

Browse files

Co-authored-by: Charles Herring <f15hb0wn@users.noreply.huggingface.co>

This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +64 -0
  2. README.md +210 -0
  3. graph/edges.jsonl +3 -0
  4. graph/graph.graphml +3 -0
  5. graph/graph.json +3 -0
  6. graph/incidents.jsonl +3 -0
  7. graph/metadata.json +17 -0
  8. graph/nodes.jsonl +0 -0
  9. reference/lead_rules_catalog.json +0 -0
  10. signals/metadata.json +1 -0
  11. signals/signals-00000.parquet +3 -0
  12. signals/signals-00001.parquet +3 -0
  13. signals/signals-00002.parquet +3 -0
  14. signals/signals-00003.parquet +3 -0
  15. signals/signals-00004.parquet +3 -0
  16. signals/signals-00005.parquet +3 -0
  17. signals/signals-00006.parquet +3 -0
  18. signals/signals-00007.parquet +3 -0
  19. signals/signals-00008.parquet +3 -0
  20. signals/signals-00009.parquet +3 -0
  21. signals/signals-00010.parquet +3 -0
  22. signals/signals-00011.parquet +3 -0
  23. signals/signals-00012.parquet +3 -0
  24. signals/signals-00013.parquet +3 -0
  25. signals/signals-00014.parquet +3 -0
  26. signals/signals-00015.parquet +3 -0
  27. signals/signals-00016.parquet +3 -0
  28. signals/signals-00017.parquet +3 -0
  29. signals/signals-00018.parquet +3 -0
  30. signals/signals-00019.parquet +3 -0
  31. signals/signals-00020.parquet +3 -0
  32. signals/signals-00021.parquet +3 -0
  33. signals/signals-00022.parquet +3 -0
  34. signals/signals-00023.parquet +3 -0
  35. signals/signals-00024.parquet +3 -0
  36. signals/signals-00025.parquet +3 -0
  37. signals/signals-00026.parquet +3 -0
  38. signals/signals-00027.parquet +3 -0
  39. signals/signals-00028.parquet +3 -0
  40. signals/signals-00029.parquet +3 -0
  41. signals/signals-00030.parquet +3 -0
  42. signals/signals-00031.parquet +3 -0
  43. signals/signals-00032.parquet +3 -0
  44. signals/signals-00033.parquet +3 -0
  45. signals/signals-00034.parquet +3 -0
  46. signals/signals-00035.parquet +3 -0
  47. signals/signals-00036.parquet +3 -0
  48. signals/signals-00037.parquet +3 -0
  49. signals/signals-00038.parquet +3 -0
  50. signals/signals-00039.parquet +3 -0
.gitattributes ADDED
@@ -0,0 +1,64 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ *.7z filter=lfs diff=lfs merge=lfs -text
2
+ *.arrow filter=lfs diff=lfs merge=lfs -text
3
+ *.avro filter=lfs diff=lfs merge=lfs -text
4
+ *.bin filter=lfs diff=lfs merge=lfs -text
5
+ *.bz2 filter=lfs diff=lfs merge=lfs -text
6
+ *.ckpt filter=lfs diff=lfs merge=lfs -text
7
+ *.ftz filter=lfs diff=lfs merge=lfs -text
8
+ *.gz filter=lfs diff=lfs merge=lfs -text
9
+ *.h5 filter=lfs diff=lfs merge=lfs -text
10
+ *.joblib filter=lfs diff=lfs merge=lfs -text
11
+ *.lfs.* filter=lfs diff=lfs merge=lfs -text
12
+ *.lz4 filter=lfs diff=lfs merge=lfs -text
13
+ *.mds filter=lfs diff=lfs merge=lfs -text
14
+ *.mlmodel filter=lfs diff=lfs merge=lfs -text
15
+ *.model filter=lfs diff=lfs merge=lfs -text
16
+ *.msgpack filter=lfs diff=lfs merge=lfs -text
17
+ *.npy filter=lfs diff=lfs merge=lfs -text
18
+ *.npz filter=lfs diff=lfs merge=lfs -text
19
+ *.onnx filter=lfs diff=lfs merge=lfs -text
20
+ *.ot filter=lfs diff=lfs merge=lfs -text
21
+ *.parquet filter=lfs diff=lfs merge=lfs -text
22
+ *.pb filter=lfs diff=lfs merge=lfs -text
23
+ *.pickle filter=lfs diff=lfs merge=lfs -text
24
+ *.pkl filter=lfs diff=lfs merge=lfs -text
25
+ *.pt filter=lfs diff=lfs merge=lfs -text
26
+ *.pth filter=lfs diff=lfs merge=lfs -text
27
+ *.rar filter=lfs diff=lfs merge=lfs -text
28
+ *.safetensors filter=lfs diff=lfs merge=lfs -text
29
+ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
30
+ *.tar.* filter=lfs diff=lfs merge=lfs -text
31
+ *.tar filter=lfs diff=lfs merge=lfs -text
32
+ *.tflite filter=lfs diff=lfs merge=lfs -text
33
+ *.tgz filter=lfs diff=lfs merge=lfs -text
34
+ *.wasm filter=lfs diff=lfs merge=lfs -text
35
+ *.xz filter=lfs diff=lfs merge=lfs -text
36
+ *.zip filter=lfs diff=lfs merge=lfs -text
37
+ *.zst filter=lfs diff=lfs merge=lfs -text
38
+ *tfevents* filter=lfs diff=lfs merge=lfs -text
39
+ # Audio files - uncompressed
40
+ *.pcm filter=lfs diff=lfs merge=lfs -text
41
+ *.sam filter=lfs diff=lfs merge=lfs -text
42
+ *.raw filter=lfs diff=lfs merge=lfs -text
43
+ # Audio files - compressed
44
+ *.aac filter=lfs diff=lfs merge=lfs -text
45
+ *.flac filter=lfs diff=lfs merge=lfs -text
46
+ *.mp3 filter=lfs diff=lfs merge=lfs -text
47
+ *.ogg filter=lfs diff=lfs merge=lfs -text
48
+ *.wav filter=lfs diff=lfs merge=lfs -text
49
+ # Image files - uncompressed
50
+ *.bmp filter=lfs diff=lfs merge=lfs -text
51
+ *.gif filter=lfs diff=lfs merge=lfs -text
52
+ *.png filter=lfs diff=lfs merge=lfs -text
53
+ *.tiff filter=lfs diff=lfs merge=lfs -text
54
+ # Image files - compressed
55
+ *.jpg filter=lfs diff=lfs merge=lfs -text
56
+ *.jpeg filter=lfs diff=lfs merge=lfs -text
57
+ *.webp filter=lfs diff=lfs merge=lfs -text
58
+ # Video files - compressed
59
+ *.mp4 filter=lfs diff=lfs merge=lfs -text
60
+ *.webm filter=lfs diff=lfs merge=lfs -text
61
+ graph/edges.jsonl filter=lfs diff=lfs merge=lfs -text
62
+ graph/graph.graphml filter=lfs diff=lfs merge=lfs -text
63
+ graph/graph.json filter=lfs diff=lfs merge=lfs -text
64
+ graph/incidents.jsonl filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,210 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: apache-2.0
3
+ task_categories:
4
+ - text-classification
5
+ - graph-ml
6
+ language:
7
+ - en
8
+ tags:
9
+ - cybersecurity
10
+ - intrusion-detection
11
+ - provenance-graphs
12
+ - MITRE-ATT&CK
13
+ - SOAR
14
+ - security-operations
15
+ - IDS
16
+ - network-security
17
+ - threat-detection
18
+ - labeled-dataset
19
+ - lead-rules
20
+ size_categories:
21
+ - 100M<n<1B
22
+ dataset_info:
23
+ - config_name: signals
24
+ splits:
25
+ - name: train
26
+ num_examples: 114074530
27
+ configs:
28
+ - config_name: signals
29
+ data_files:
30
+ - split: train
31
+ path: signals/*.parquet
32
+ - config_name: graph_nodes
33
+ data_files:
34
+ - split: train
35
+ path: graph/nodes.jsonl
36
+ - config_name: graph_edges
37
+ data_files:
38
+ - split: train
39
+ path: graph/edges.jsonl
40
+ - config_name: incidents
41
+ data_files:
42
+ - split: train
43
+ path: graph/incidents.jsonl
44
+ ---
45
+
46
+ # WitFoo Precinct6 Cybersecurity Dataset (114M)
47
+
48
+ ## Overview
49
+
50
+ A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by [WitFoo Precinct](https://www.witfoo.com/) version 6.x. This dataset contains **114 million sanitized security events** (signal logs) and **provenance graphs** (10,442 incident graphs with 23,362 nodes and 32,732,650 edges) from real enterprise network monitoring across 5 organizations.
51
+
52
+ **Available in two sizes:**
53
+ - [`witfoo/precinct6-cybersecurity`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity) — 2M signals (smaller, faster to load)
54
+ - [`witfoo/precinct6-cybersecurity-100m`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m) — **114M signals (this dataset)**
55
+
56
+ **Generate your own:** WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: [`witfoo/dataset-from-precinct6`](https://github.com/witfoo/dataset-from-precinct6)
57
+
58
+ This dataset is designed to support research in:
59
+ - **Provenance graph-based intrusion detection** (KnowHow, NodLink, and similar systems)
60
+ - **AI-driven cyber defense simulation** (CybORG and MARL-based defense policy training)
61
+ - **Security alert classification** (malicious vs. suspicious vs. benign event labeling)
62
+ - **Attack lifecycle analysis** using MITRE ATT&CK framework mappings
63
+ - **Detection rule evaluation** using WitFoo's 261 lead detection rules
64
+
65
+ ## Quick Start
66
+
67
+ ```python
68
+ from datasets import load_dataset
69
+
70
+ # Load flat signal logs (114M rows across 58 Parquet shards)
71
+ signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
72
+
73
+ # Find malicious events (from confirmed incidents)
74
+ malicious = signals.filter(lambda x: x["label_binary"] == "malicious")
75
+
76
+ # Find suspicious events (matched detection rules)
77
+ suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
78
+
79
+ # Query by product/vendor
80
+ cisco_events = signals.filter(lambda x: x["vendor_name"] == "Cisco")
81
+
82
+ # Load provenance graph
83
+ nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
84
+ edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
85
+
86
+ # Load full incident graphs
87
+ incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
88
+ ```
89
+
90
+ ## Label Distribution
91
+
92
+ | Label | Count | Percentage |
93
+ |-------|-------|------------|
94
+ | `benign` | 113,326,050 | 99.34% |
95
+ | `malicious` | 125,780 | 0.11% |
96
+ | `suspicious` | 622,700 | 0.55% |
97
+
98
+ ## Signal Columns
99
+
100
+ | Column | Type | Description |
101
+ |--------|------|-------------|
102
+ | `timestamp` | float | Unix epoch timestamp |
103
+ | `message_type` | string | Event classification (e.g., `firewall_action`, `account_logon`, `AssumeRole`) |
104
+ | `stream_name` | string | Source product/data stream (see Source Products below) |
105
+ | `pipeline` | string | Ingestion pipeline |
106
+ | `src_ip` | string | Source IP (sanitized) |
107
+ | `dst_ip` | string | Destination IP (sanitized) |
108
+ | `src_port` | string | Source port |
109
+ | `dst_port` | string | Destination port |
110
+ | `protocol` | string | Network protocol (6=TCP, 17=UDP, 1=ICMP) |
111
+ | `src_host` | string | Source hostname (sanitized) |
112
+ | `dst_host` | string | Destination hostname (sanitized) |
113
+ | `username` | string | Associated username (sanitized) |
114
+ | `action` | string | Event action (block, permit, logon, logoff) |
115
+ | `severity` | string | Severity level |
116
+ | `vendor_code` | string | Vendor-specific event code |
117
+ | `message_sanitized` | string | Full sanitized raw log message |
118
+ | `label_binary` | string | `malicious`, `suspicious`, or `benign` |
119
+ | `label_confidence` | float | Confidence score (0.0–1.0) |
120
+ | `suspicion_score` | float | WitFoo suspicion score (0.0–1.0) |
121
+ | `mo_name` | string | Modus operandi (e.g., `Data Theft`) |
122
+ | `lifecycle_stage` | string | Kill chain stage (e.g., `initial-compromise`, `complete-mission`) |
123
+ | `matched_rules` | string | JSON array of matched WitFoo lead rule descriptions |
124
+ | `set_roles` | string | JSON array of classification roles (e.g., `Exploiting Host`, `C2 Server`) |
125
+ | `product_name` | string | Security product name (e.g., `ASA Firewall`, `Falcon`) |
126
+ | `vendor_name` | string | Product vendor (e.g., `Cisco`, `Crowdstrike`) |
127
+
128
+ ## Source Products
129
+
130
+ The dataset contains events from **158 security products** across **70+ vendors**. Complete catalog in `reference/lead_rules_catalog.json`.
131
+
132
+ | Category | Products |
133
+ |----------|----------|
134
+ | **Firewalls** | Cisco ASA, Palo Alto PAN NGFW, Fortinet FortiGate, Checkpoint, Meraki, SonicWall, pfSense, Barracuda, Juniper SRX |
135
+ | **Endpoint Protection** | CrowdStrike Falcon, Symantec SEP, Carbon Black, Cylance, SentinelOne, Deep Instinct, Sophos, McAfee, ESET |
136
+ | **Network Detection** | Cisco Stealthwatch, Cisco Firepower, Suricata IDS, TippingPoint IPS, Vectra Cognito |
137
+ | **Identity & Access** | Microsoft Windows AD, Cisco ISE, Centrify, CyberArk, Duo, Okta, Beyond Trust |
138
+ | **Cloud Security** | AWS CloudTrail, AWS VPC Flow Logs, AWS GuardDuty, Azure Security, Zscaler, Netskope, Cisco Umbrella |
139
+ | **Email Security** | ProofPoint, Mimecast, FireEye EX, Barracuda ESS, Cisco IronPort, Checkpoint Harmony |
140
+ | **Threat Intelligence** | FireEye NX/HX/AX/CMS, Trend Micro, QRadar, Microsoft ATA, Cortex XDR |
141
+ | **Infrastructure** | VMware vCenter/NSX, Elastic Filebeat, Linux (sshd, PAM, systemd, auditd), Apache, HAProxy |
142
+
143
+ ## Labeling Methodology
144
+
145
+ **Three-tier labels** derived from two sources:
146
+
147
+ - **`malicious`** (125,780): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
148
+ - **`suspicious`** (622,700): Events matching WitFoo's 261 lead detection rules (e.g., "ASA Deny", "Windows Failed Login", "CrowdStrike Detection") but not in confirmed incidents.
149
+ - **`benign`** (113,326,050): Events not matching any detection rules and not in any incident.
150
+
151
+ The `matched_rules` column shows which detection rules matched. The `set_roles` column shows WitFoo classification roles (Exploiting Host, C2 Server, Staging Target, etc.).
152
+
153
+ ## Lead Detection Rules
154
+
155
+ 261 rules included in `reference/lead_rules_catalog.json`. Examples:
156
+
157
+ | Rule | Criteria | Roles |
158
+ |------|----------|-------|
159
+ | Blocked Action | Any firewall block | Exploiting Host → Exploiting Target |
160
+ | ASA Deny | cisco_asa + deny | Exploiting Host → Exploiting Target |
161
+ | Windows Failed Login | Event ID 4625 | Exploiting Target → Exploiting Host |
162
+ | CrowdStrike Detection | CrowdStrike stream | Exploiting Target → Exploiting Host |
163
+ | AWS VPC Reject | VPC flow + REJECT | Exploiting Host → Exploiting Target |
164
+ | Authentication Failure | auth_failure type | Exploiting Host → Exploiting Target |
165
+ | Audit log cleared | Event ID 1102 | Exploiting Target → Exploiting Host |
166
+
167
+ ## Sanitization
168
+
169
+ All customer-identifying information has been removed through a comprehensive, iterative four-layer sanitization pipeline. Quality was prioritized over processing speed. The pipeline is [open source](https://github.com/witfoo/dataset-from-precinct6) under the Apache 2.0 license.
170
+
171
+ 1. **Structured field sanitization + Aho-Corasick multi-pattern sweep** — Known fields are replaced with deterministic tokens (IPs to [RFC 5737](https://datatracker.ietf.org/doc/html/rfc5737) ranges, hostnames to `HOST-NNNN`, etc.). Every record is then swept using an [Aho-Corasick automaton](https://en.wikipedia.org/wiki/Aho%E2%80%93Corasick_algorithm) built from all 302,000+ registry entries to catch PII in unexpected contexts. Product identifiers are explicitly protected from the sweep.
172
+ 2. **Format-specific log message parsing** — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback — sanitizing PII within structured fields like XML elements, nested JSON, and CSV columns.
173
+ 3. **Machine learning residual detection** — [Microsoft Presidio](https://microsoft.github.io/presidio/) (spaCy NLP) and [BERT NER](https://huggingface.co/dslim/bert-base-NER) scan sanitized records for residual PII that pattern-based approaches miss. New discoveries trigger full re-sanitization.
174
+ 4. **Large language model contextual review** — [Claude](https://www.anthropic.com/claude) reviews stratified samples for subtle PII: embedded org names, internal hostnames revealing organizational structure, employee names in file paths, AD group names, and geographic identifiers. Findings trigger re-sanitization.
175
+
176
+ **Iterative convergence:** The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles across the complete dataset. Cycles repeat until near-zero new discoveries.
177
+
178
+ **Final PII registry:** ~302,000 unique mappings across 14 categories (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.
179
+
180
+ ## Graph Data
181
+
182
+ | Component | Count |
183
+ |-----------|-------|
184
+ | Nodes | 23,362 |
185
+ | Edges | 32,732,650 |
186
+ | Incidents | 10,442 (Data Theft: 10,441, Phishing: 1) |
187
+
188
+ ## Limitations
189
+
190
+ - **Label imbalance**: 99.77% benign reflects production SOC reality. Sampling strategies needed for balanced training.
191
+ - **Temporal scope**: July–August 2024
192
+ - **Sanitization**: ~302,000 PII registry entries used for consistent replacement across all records
193
+ - **Shared incidents**: Same 10,442 incidents appear in both 2M and 114M datasets
194
+ - **Sanitization trade-offs**: Some log message detail reduced by PII replacement
195
+
196
+ ## Citation
197
+
198
+ ```bibtex
199
+ @dataset{witfoo_precinct6_100m_2025,
200
+ title={WitFoo Precinct6 Cybersecurity Dataset (114M)},
201
+ author={WitFoo, Inc.},
202
+ year={2025},
203
+ url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
204
+ license={Apache-2.0}
205
+ }
206
+ ```
207
+
208
+ ## License
209
+
210
+ [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0)
graph/edges.jsonl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2f889210c91188303d7a1003772dce10f5c7559e57aa03216a4f7dc7e2b4d631
3
+ size 10008560592
graph/graph.graphml ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:883570ee21dfc041d56f8e7a52de46eb251585b9ca956bb1f7d3393c73248114
3
+ size 22139401
graph/graph.json ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5edb37a47134f03488762eb6883d856e53147733672c825079e6d30c0b03cb9f
3
+ size 18970745
graph/incidents.jsonl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6f9749aa5ebf4ad2ca31b2b084555936ba3ddb6156dedf111e6b774636023158
3
+ size 557961578
graph/metadata.json ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "dataset_name": "WitFoo Precinct6 Cybersecurity Dataset",
3
+ "version": "1.0.0",
4
+ "node_count": 23362,
5
+ "edge_count": 32732650,
6
+ "label_distribution": {
7
+ "benign": 31995325,
8
+ "malicious": 125700,
9
+ "suspicious": 611625
10
+ },
11
+ "edge_type_distribution": {
12
+ "EVENT": 32193601,
13
+ "NETWORK_FLOW": 505035,
14
+ "DNS_RESOLVE": 34014
15
+ },
16
+ "incident_count": 10442
17
+ }
graph/nodes.jsonl ADDED
The diff for this file is too large to render. See raw diff
 
reference/lead_rules_catalog.json ADDED
The diff for this file is too large to render. See raw diff
 
signals/metadata.json ADDED
@@ -0,0 +1 @@
 
 
1
+ {"row_count": 114074530, "shard_count": 58, "refresh_trigger": true}
signals/signals-00000.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d5d954dc9efd5da204e9c230ee1865600a53b6a2bfb7fbe744103589ecd82fa2
3
+ size 193587448
signals/signals-00001.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4a54d7066c87a841ae171f26ddc922008a7294b70dc792c4acfb37b16d89489f
3
+ size 498644839
signals/signals-00002.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dfb51d2b23ae5b7561c96632d678ae81ce2acc039e4710a731c01f3b88b0b5c6
3
+ size 505581831
signals/signals-00003.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:914417a4a92764a3873c562d824c6c51f14aa808ea7990dde012525e97280be2
3
+ size 505497713
signals/signals-00004.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:74cba947430e0a0c6cf014b3675ab192a8fb1a6f04ac1cf2dca4880b5baf0387
3
+ size 499745694
signals/signals-00005.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e465b14c7748bed980a58f7cd1135820479144ec063b4ab59f45cd298d803782
3
+ size 501100332
signals/signals-00006.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0d459d162bbe5c9f846965b027b16d8de02538473f654ac6a5cf1ae08cfa9846
3
+ size 270279278
signals/signals-00007.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b2aa9210cb9510cd65225532175e6da8ae4f429fee08c1f6914002d62582cee1
3
+ size 250793712
signals/signals-00008.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1aec1e75897e32d67b4ed2399c2940cba01e8b5c26268d51f2ef7b3786277de1
3
+ size 292686619
signals/signals-00009.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:646937bae1fc30c138891591861c8878f8f55167f3e12a0a4ff4ae8a49e7fc0b
3
+ size 270430202
signals/signals-00010.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bdbc519d271ce662b412f48c449e7645de399348fcab04f88689f22735fb2db3
3
+ size 257566845
signals/signals-00011.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e64ef017b86ff8876e1b8e85267f71c014ee22da84a9e47158c6e41394dda53e
3
+ size 241925252
signals/signals-00012.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5475b7b32548d5e3e8cf84190eb8dfd2d798ee55d587b10246094da7ba7e16fd
3
+ size 250992921
signals/signals-00013.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:67b95632f6ca592e7b7a970ab4d6169e037c5ad295a4f0eec483cc01958e4027
3
+ size 275248494
signals/signals-00014.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:44cdfb55a1aceb199843ec8a3eeda0bc70e5d6941b5f3039a8456db2e24cff12
3
+ size 277127194
signals/signals-00015.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9e883785ea824acd7017880d7f75871a0a635162b375a8704522feccff9a94a6
3
+ size 272403791
signals/signals-00016.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:26a7d41e00e5f86890663e6b5ff388969419b6cbbbb78a1407aa5bd07074dc7c
3
+ size 267273124
signals/signals-00017.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e51061a1b24154d6d2a7f726f6b2ba291eb0ac8f5c8d6e3f6a840ec0209bcbb9
3
+ size 256631337
signals/signals-00018.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dfe288cfb1859d932d10d7e9d5efb1c0922ee622ec9a158c0e701f420af54e25
3
+ size 235156207
signals/signals-00019.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3fb2ac01ac781d1d640e0e3aac8f913886b11f355a2ca1ccfb57017659ed3c1c
3
+ size 288224244
signals/signals-00020.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fdd14b58fab36f575c80815c40e59a03bc4350d46746cf24f9af50a3ef74f284
3
+ size 245469859
signals/signals-00021.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:21aed3c994c3e290162e70798d488896ddd35c28596c9b177e5d2d322fe6d0ff
3
+ size 285954613
signals/signals-00022.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3fbe06b82e8f07f3ec57219025142005d11af32e30fe478840d7112eaf861ecf
3
+ size 265645535
signals/signals-00023.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2ff9885af81f6b97f4dfc72eab415be5bcd9e97ff00c8ea0a8c485368a4f3a3b
3
+ size 276419241
signals/signals-00024.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a94257106280ae37d3c96ebbd6e81b7db84cedc922c63695bbbdfa7aeb31c0f5
3
+ size 270314976
signals/signals-00025.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7c45e932af407b45376a7967e14c3f306049b2f590bd6828c2043200f3ef9890
3
+ size 285036377
signals/signals-00026.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8f77cfe4e4c2e599cbf467f2e4e37f533a23cbbf0c23f80d7e06289397139b7d
3
+ size 242510347
signals/signals-00027.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bd03519e5954ddea3265084f66d3351e0c1f4f505e9fe5ebd43820287c068180
3
+ size 233328615
signals/signals-00028.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4a8d2c1c43e766c42be8813dd6d082c31766a2a8d20c69fedffafa693ee0dd11
3
+ size 276191108
signals/signals-00029.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:30b73e2de95777484c138ca11a4ac3f3e9125d8aab459f7b1137b6846d8c143a
3
+ size 266549570
signals/signals-00030.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:92ce83f0445df63386845b0d4805f0559112d23db225b2a50aeea510e2e94411
3
+ size 254278628
signals/signals-00031.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0db3c72f9e13e2404f89728edcb645ff86af133cc884aa5c220e3d1f641a119d
3
+ size 270284176
signals/signals-00032.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a9b1480c33a082389a3823f007acaf0e70dd17a96e4166e593f5089219ae90d1
3
+ size 265532267
signals/signals-00033.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1c3d26f709200f7a8c66f398a51af73192d2dd2460ec539bbb0c1ff1cdb67f8c
3
+ size 258276175
signals/signals-00034.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b663614771b4561afd795898eb57f2cc5e45ee94af9bf660b5c8d9780a44c43f
3
+ size 219551359
signals/signals-00035.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a11ccbf4acdb04ecc271d78d809d7253d0d2238f19c23e619832b900e5f8180c
3
+ size 276046586
signals/signals-00036.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a58a511e6902ad103686cba0ddaa60da9919148b7065a69254ae485f2a88618c
3
+ size 269156873
signals/signals-00037.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b556afea944da49d31c9c585f62d977642374a0f62a81b18172c384815a0576d
3
+ size 241113201
signals/signals-00038.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8fe818e0a050d367a4595ba9f521dad724c3fd9b74bd713b7d86d9eccb90ceac
3
+ size 240215755
signals/signals-00039.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:49ca4663fb62e44675fa6ab38c1c238cd1d7f077b466709f3b97adb87ce46835
3
+ size 255156153