forked from splunk/attack_data
-
Notifications
You must be signed in to change notification settings - Fork 0
/
replay.yml
27 lines (25 loc) · 803 Bytes
/
replay.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
splunk:
# connects to host on port 8089 make sure you have access to <host>:8089
host: localhost
username: admin
password: changeme
datasets:
#name of data set to replay
- name: T1003.002_windows_security
# relative path of raw file
path: datasets/attack_techniques/T1003.002/atomic_red_team/windows-security.log
# splunk parameters to pass
replay_parameters:
source: WinEventLog:Security
sourcetype: WinEventLog
index: main
# updates timestamp of the dataset to current time.
update_timestamp: True
enabled: True
- name: T1003.002_sysmon
path: datasets/attack_techniques/T1003.002/atomic_red_team/windows-sysmon.log
replay_parameters:
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: xmlwineventlog
index: main
enabled: True