These datasets are made available to academia and industry to promote research and inquiry, representing the execution logs of 9,376, 2,195 APT samples respectively.
- APT-EXE execution logs contain 24 primary feature categories. These categories are Imports, Runtime DLLs, Registry Set, Registry Set Value, Registry Set Type, Registry Deleted, Service (Opened, Controlled, Created, Started), Process (Terminated, Created, Injected), Shell Commands, File (Read, Opened, Written, Replaced, Deleted, Moved and Copy source and destination), and additionally respective DLLs and functions called.
- The APT-DLL dataset represents two feature categories of DLLs and functions called.
- The APT-IoC dataset contains 21,986 log records across 57 file types.
The following table is necessary for this dataset to be indexed by search engines such as Google Dataset Search.
property | value |
---|---|
name | Advanced Persistent Threat (APT) Datasets. |
description | APT Execution datasets, representing the execution logs of 9,376, and 2,195 APT samples respectively. APT-EXE execution logs contain 24 primary feature categories. These categories are Imports, Runtime DLLs, Registry Set, Registry Set Value, Registry Set Type, Registry Deleted, Service (Opened, Controlled, Created, Started), Process (Terminated, Created, Injected), Shell Commands, File (Read, Opened, Written, Replaced, Deleted, Moved and Copy source and destination), and additionally respective DLLs and functions called. The APT-DLL dataset represents two feature categories of DLLs and functions called. |
sameAs | https://github.com/aptresearch/datasets/ |