Skip to content

Commit b26a24f

Browse files
author
Patrick Bareiss
committed
Update Readme
1 parent 3002c8c commit b26a24f

File tree

1 file changed

+25
-33
lines changed

1 file changed

+25
-33
lines changed

README.md

Lines changed: 25 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -63,33 +63,33 @@ Datasets are defined by a common YML structure. The structure has the following
6363
For example
6464

6565
```
66-
id: 405d5889-16c7-42e3-8865-1485d7a5b2b6
6766
author: Patrick Bareiss
67+
id: cc9b25e1-efc9-11eb-926b-550bf0943fbb
6868
date: '2020-10-08'
69-
description: 'Atomic Test Results: Successful Execution of test T1003.001-1 Windows
70-
Credential Editor Successful Execution of test T1003.001-2 Dump LSASS.exe Memory
71-
using ProcDump Return value unclear for test T1003.001-3 Dump LSASS.exe Memory using
72-
comsvcs.dll Successful Execution of test T1003.001-4 Dump LSASS.exe Memory using
73-
direct system calls and API unhooking Return value unclear for test T1003.001-6
74-
Offline Credential Theft With Mimikatz Return value unclear for test T1003.001-7
75-
LSASS read with pypykatz '
69+
description: 'Atomic Test Results: Successful Execution of test T1003.003-1 Create
70+
Volume Shadow Copy with NTDS.dit Successful Execution of test T1003.003-2 Copy NTDS.dit
71+
from Volume Shadow Copy Successful Execution of test T1003.003-3 Dump Active Directory
72+
Database with NTDSUtil Successful Execution of test T1003.003-4 Create Volume Shadow
73+
Copy with WMI Return value unclear for test T1003.003-5 Create Volume Shadow Copy
74+
with Powershell Successful Execution of test T1003.003-6 Create Symlink to Volume
75+
Shadow Copy '
7676
environment: attack_range
77-
technique:
78-
- T1003.001
79-
dataset:
80-
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.001/atomic_red_team/windows-powershell.log
81-
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.001/atomic_red_team/windows-security.log
82-
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.001/atomic_red_team/windows-sysmon.log
83-
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.001/atomic_red_team/windows-system.log
84-
references:
85-
- https://attack.mitre.org/techniques/T1003/001/
86-
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.001/T1003.001.md
87-
- https://github.com/splunk/security-content/blob/develop/tests/T1003_001.yml
88-
sourcetypes:
89-
- XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
90-
- WinEventLog:Microsoft-Windows-PowerShell/Operational
91-
- WinEventLog:System
92-
- WinEventLog:Security
77+
directory: atomic_red_team
78+
mitre_technique:
79+
- T1003.003
80+
datasets:
81+
- name: crowdstrike_falcon
82+
path: /datasets/attack_techniques/T1003.003/atomic_red_team/crowdstrike_falcon.log
83+
sourcetype: crowdstrike:events:sensor
84+
source: crowdstrike
85+
- name: 4688_windows-security
86+
path: /datasets/attack_techniques/T1003.003/atomic_red_team/4688_windows-security.log
87+
sourcetype: XmlWinEventLog
88+
source: XmlWinEventLog:Security
89+
- name: windows-sysmon
90+
path: /datasets/attack_techniques/T1003.003/atomic_red_team/windows-sysmon.log
91+
sourcetype: XmlWinEventLog
92+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
9393
```
9494

9595

@@ -129,14 +129,6 @@ pip install -r bin/requirements.txt
129129

130130
See a quick demo 📺 of this process [here](https://www.youtube.com/watch?v=41NAG0zGg40).
131131

132-
### Into DSP
133-
134-
To send datasets into DSP the simplest way is to use the [scloud](https://docs.splunk.com/Documentation/DSP/1.1.0/Admin/AuthenticatewithSCloud) command-line-tool as a requirement.
135-
136-
1. Download the dataset
137-
2. Ingest the dataset into DSP via scloud command `cat attack_data.json | scloud ingest post-events --format JSON
138-
3. Build a pipeline that reads from the firehose and you should see the events.
139-
140132
# Contribute Datasets 🥰
141133

142134
1. Generate a dataset
@@ -162,7 +154,7 @@ This project takes advantage of automation to generate datasets using the attack
162154

163155
## License
164156

165-
Copyright 2023 Splunk Inc.
157+
Copyright 2025 Splunk Inc.
166158

167159
Licensed under the Apache License, Version 2.0 (the "License");
168160
you may not use this file except in compliance with the License.

0 commit comments

Comments
 (0)