Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/splunk/botsv2
Splunk Boss of the SOC version 2 dataset.
https://github.com/splunk/botsv2
Last synced: about 1 month ago
JSON representation
Splunk Boss of the SOC version 2 dataset.
- Host: GitHub
- URL: https://github.com/splunk/botsv2
- Owner: splunk
- License: cc0-1.0
- Created: 2018-12-11T17:44:25.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2022-11-01T18:34:00.000Z (about 2 years ago)
- Last Synced: 2024-08-01T08:09:53.543Z (4 months ago)
- Size: 36.1 KB
- Stars: 350
- Watchers: 47
- Forks: 68
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-lists - dataset v2
README
# Boss of the SOC (BOTS) Dataset Version 2
A sample security dataset and CTF platform for information security professionals, researchers, students, and enthusiasts. This page hosts information regarding the version 2 *dataset*. If you would like access to the scoreboard software, please visit [the CTF Scoreboard Github repository](https://github.com/splunk/SA-ctf_scoreboard). If you are looking for the BOTS version 1 dataset, it can be found [here](https://github.com/splunk/botsv1).## Download
| Dataset | Description | Size | Format | MD5 |
| ---------------- | ----------- | ---- | ------ | --- |
| [BOTS V2 Dataset](https://s3.amazonaws.com/botsdataset/botsv2/botsv2_data_set.tgz) | Full BOTSv2 dataset. | 16.4GB | Pre-indexed Splunk | fd2673726c96e97a39fc03119d6686c6 |
| [BOTS V2 Dataset (Attack Only)](https://s3.amazonaws.com/botsdataset/botsv2/botsv2_data_set_attack_only.tgz) | BOTSv2 "attack-only" dataset. This dataset contains minimal non-attack-related (aka "clean") data. It's everything you need and nothing you don't! | 3.2GB | Pre-indexed Splunk | 6ea8f15cc4ccf6186db7a31415c09c58 |Note: Choose *either* the full dataset *or* the attack-only dataset. You cannot install them both simultaneously. The BOTS V2 Dataset is a superset of the BOTS V2 Attack Only Dataset.
## Installation
1. Download the dataset file indicated above and check the MD5 hash to ensure integrity.
2. Install Splunk Enterprise and the apps/add-ons listed in the *Required Software* section below. It is important to match the specific version of each app and add-on.
3. Unzip/untar the downloaded file into $SPLUNK_HOME/etc/apps
4. Restart Splunk
5. The BOTS v2 data will be available by searching:```
index=botsv2 earliest=0
```
6. Note that because the data is distributed in a pre-indexed format, there are no volume-based licensing limits to be concerned with.## Data Sourcetypes included
* access_combined
* activedirectory
* apache:error
* apache_error
* auditd
* bandwidth
* collectd
* cpu
* csp-violation
* df
* ess_content_importer
* hardware
* interfaces
* iostat
* lastlog
* linux:selinuxconfig
* linux_audit
* linux_secure
* ms:o365:management
* msad:nt6:health
* msad:nt6:siteinfo
* mysql:connection:stats
* mysql:database
* mysql:errorlog
* mysql:instance:stats
* mysql:server:stats
* mysql:status
* mysql:table_io_waits_summary_by_index_usage
* mysql:tablestatus
* mysql:transaction:details
* mysql:transaction:stats
* mysql:user
* mysql:variables
* mysqld-8
* netstat
* openports
* osquery_info
* osquery_results
* osquery_warning
* package
* pan:system
* pan:threat
* pan:traffic
* perfmon:cpu
* perfmon:logicaldisk
* perfmon:memory
* perfmon:network
* perfmon:network_interface
* perfmon:ntds
* perfmon:physicaldisk
* perfmon:process
* perfmon:processor
* perfmon:system
* powershell:scriptexecutionsummary
* protocol
* ps
* script:installedapps
* script:listeningports
* stream:arp
* stream:dhcp
* stream:dns
* stream:ftp
* stream:http
* stream:icmp
* stream:ip
* stream:irc
* stream:ldap
* stream:mysql
* stream:smb
* stream:smtp
* stream:tcp
* stream:udp
* suricata
* symantec:ep:agent:file
* symantec:ep:agt_system:file
* symantec:ep:behavior:file
* symantec:ep:packet:file
* symantec:ep:scan:file
* symantec:ep:scm_system:file
* symantec:ep:security:file
* symantec:ep:traffic:file
* syslog
* time
* top
* unix:listeningports
* unix:service
* unix:update
* unix:uptime
* unix:useraccounts
* unix:version
* userswithloginprivs
* vmstat
* web_ping
* weblogic_access_combined
* weblogic_stdout
* who
* windowsupdatelog
* wineventlog:application
* wineventlog:directory-service
* wineventlog:security
* wineventlog:system
* winhostmon
* winregistry
* xmlwineventlog:microsoft-windows-sysmon/operational## Required Software
The dataset requires the following software which is distributed and licensed separately
and should be installed before using the dataset. The versions listed are
those that were used to create the dataset. Different versions of the software
may or may not work properly. If you are new to Splunk, follow [these instructions](http://docs.splunk.com/Documentation/Splunk/latest/Installation/Whatsinthismanual) to install the free Splunk Enterprise trial and [these instructions](https://docs.splunk.com/Documentation/AddOns/released/Overview/Singleserverinstall) to install apps and add-ons.| App / Add-on | Version | Download |
| ----------- | ------- | -------- |
| Splunk Enterprise | 7.2.1 | http://www.splunk.com
| SA-Investigator | 1.3.1 | https://splunkbase.splunk.com/app/3749/
| Base64 | 1.1 | https://splunkbase.splunk.com/app/1922/
| URL Toolbox | 1.6 | https://splunkbase.splunk.com/app/2734/
| Splunk Security Essentials | 2.3.0 | https://splunkbase.splunk.com/app/3435/
| JellyFisher | 0.1.0 | https://splunkbase.splunk.com/app/3626/
| Splunk Common Information Model | 4.12.0 | https://splunkbase.splunk.com/app/1621/
| Splunk Add-on for Apache | 1.0.0 | https://splunkbase.splunk.com/app/3186/
| Splunk Add-on for Microsoft Cloud Services | 2.0.3 | https://splunkbase.splunk.com/app/3110/
| Palo Alto Networks Add-on for Splunk | 3.8.2 | https://splunkbase.splunk.com/app/2757/
| Splunk Add-on for Symantec Endpoint Protection | 2.3.0 | https://splunkbase.splunk.com/app/2772/
| TA-Suricata | 2.3.3 | https://splunkbase.splunk.com/app/2760/
| Microsoft Sysmon Add-on | 6.0.4 | https://splunkbase.splunk.com/app/1914/
| Collectd App for Splunk Enterprise | 1.1 | https://splunkbase.splunk.com/app/2875/
| OSquery | 1 | https://splunkbase.splunk.com/app/3278/
| SSL Certificate Checker | 3.2 | https://splunkbase.splunk.com/app/3172/
| Website Monitoring | 2.5 | https://splunkbase.splunk.com/app/1493/
| Splunk Add-on for Microsoft IIS | 1.0.0 | https://splunkbase.splunk.com/app/3185/
| Splunk Add-on for Unix and Linux | 6.0.0 | https://splunkbase.splunk.com/app/833/
| Splunk Stream Add-on | 7.1.1 | https://splunkbase.splunk.com/app/1809/
| Splunk Add-on for Microsoft Windows | 5.0.1 | https://splunkbase.splunk.com/app/742/## Warning
**Please be advised that this dataset may contain profanity, slang, vulgar expressions, and/or generally offensive terminology. Please use with discretion.**This dataset contains evidence captured during actual computer security incidents, or from realistic lab recreations of security incidents. As such, the dataset **may** contain profanity, slang, vulgar expressions, and/or generally offensive terminology. The authors believe that the educational benefits of preserving the realism of the dataset outweigh the risk of offending some users. If the possibility of encountering this type of offensive material is a concern to you or to any audience with whom you plan to share the dataset, please stop now and do not continue.
## Authors
Written in 2017 by Ryan Kovar, David Herrald, James Brodsky, John Stoner, Jim Apger, and David Veuve## Copyright and License
To the extent possible under law, the author(s) have dedicated
all copyright and related and neighboring rights to this software
to the public domain worldwide. This software is distributed
without any warranty. You should have received a copy of the CC0
Public Domain Dedication along with this software. If not, see
http://creativecommons.org/publicdomain/zero/1.0/.