antoinethebuilder / mordor

Re-play Adversarial Techniques

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Mordor 😈

Binder License: GPL v3 Twitter Open_Threat_Research Community Open Source Love svg1

mordor_logo

The Mordor project provides pre-recorded security events generated after simulating adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption and Packet Capture (PCAP) files as additional context when applicable. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the MITRE ATT&CK Framework. The pre-recorded data represents not only specific known malicious events but additional context/events that occur around it. This is done on purpose so that you can test creative correlations across diverse data sources, enhancing your detection strategy and potentially reducing the number of false positives in your own environment.

The name Mordor comes from the awesome book/film series "The Lord of the Rings", and it was a place where the evil forces of Sauron lived. This repository is where data generated by known "malicious" adversarial activity lives, hence the name of the project.

Interactive Documentation

Goals

  • Provide open portable malicious datasets to expedite the development of data analytics.
  • Facilitate and expedite adversay techniques simulation and output consumption.
  • Allow security analysts around the world to test their skills with real known bad data.
  • Improve the testing and validation of detection analytics in an easier, practical, modular and more affordable way.
  • Enable data scientists to have semi-labeled data for initial research and features development.
  • Map datasets to other open source projects such as Sigma, Atomic Red Team, Threat Hunter Playbook (Jupyter Notebooks) and MITRE CAR analytics
  • Contribute to the ATT&CK framework framework and provide real-world data samples during the creation and validation of data sources.
  • Provide datasets for other social/community events such as Capture The Flags (CTFs) or hackathons to encourage collaboration.

Projects Using Mordor

Authors

Contributing

There are a few things that we would like to accomplish with this repo as shown in the To-Do list below. Share your pre-recorded data with us following our same setup (working on a standard setup..), and help others in the Cyber community to validate their detection use cases in a faster and easier way.

License: GPL-3.0

Mordor's GNU General Public License

About

Re-play Adversarial Techniques

License:GNU General Public License v3.0


Languages

Language:Python 73.0%Language:PowerShell 25.2%Language:Dockerfile 1.8%