DeceptionPro commited on
Commit
247b19c
·
verified ·
1 Parent(s): 0796d67

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +0 -1
README.md CHANGED
@@ -49,7 +49,6 @@ size_categories:
49
  viewer: false
50
  ---
51
 
52
- About
53
  This dataset contains raw Endpoint Detection & Response (EDR) telemetry captured during controlled Deception.Pro malware sandbox operations on an enterprise Active Directory network. Unlike most malware sandboxes — which detonate samples for roughly 30 minutes — our operations run for hours or days per analysis, capturing the full arc of adversary behavior. The data represents a full-fidelity snapshot of system activity recorded while threat actors interacted with a live deception environment, making it a rare, real-world ground-truth record of malicious activity observed alongside authentic benign baseline noise.
54
  The dataset captures the complete process execution tree of a live Windows system, enriched with network telemetry, DNS resolution activity, and file system interaction events. Because it was collected in an extended malware sandbox context, it contains authentic attacker tooling artifacts (including malware executable telemetry, persistence mechanisms, and C2 communications) co-mingled with normal system traffic — making it uniquely valuable for training detection models, validating SIEM rules, and threat hunting research.
55
 
 
49
  viewer: false
50
  ---
51
 
 
52
  This dataset contains raw Endpoint Detection & Response (EDR) telemetry captured during controlled Deception.Pro malware sandbox operations on an enterprise Active Directory network. Unlike most malware sandboxes — which detonate samples for roughly 30 minutes — our operations run for hours or days per analysis, capturing the full arc of adversary behavior. The data represents a full-fidelity snapshot of system activity recorded while threat actors interacted with a live deception environment, making it a rare, real-world ground-truth record of malicious activity observed alongside authentic benign baseline noise.
53
  The dataset captures the complete process execution tree of a live Windows system, enriched with network telemetry, DNS resolution activity, and file system interaction events. Because it was collected in an extended malware sandbox context, it contains authentic attacker tooling artifacts (including malware executable telemetry, persistence mechanisms, and C2 communications) co-mingled with normal system traffic — making it uniquely valuable for training detection models, validating SIEM rules, and threat hunting research.
54