A powerful tool for generating realistic security scenarios with complete forensic evidence chains. Features AI-powered data generation, MITRE ATT&CK integration, and realistic attack campaign simulation with source logs that trigger alerts.
- π’ AI4SOC Platform Support: Generate alerts for Splunk, SentinelOne, and Google SecOps
- π Multi-Environment Generation: Scale across 100s-1000s of simulated environments
- π¬ Multi-Field Generation: Up to 50,000 additional security fields per document
- βοΈ Advanced MITRE Integration: Sub-techniques, attack chains, and tactic focusing
- ποΈ Visual Event Analyzer Integration: Linux process events with full correlation support
- π― False Positive Testing: Generate realistic false positives for rule tuning
- π£οΈ MCP Server Support: Conversational interface for enterprise-scale generation
-
Install dependencies:
yarn install
-
Initialize configuration:
yarn start
Follow the guided setup to create your
config.jsonfile. -
Generate detection rules and attack scenarios:
# Generate detection rules (all types) yarn start rules -r 10 -s default # Complete ransomware attack with realistic logs β alerts pipeline yarn start generate-campaign ransomware --realistic --mitre --detection-rate 0.6
| Command | Description | Example |
|---|---|---|
rules --rule-types |
π‘οΈ Detection rules (all types) | yarn start rules -r 15 --rule-types query,threshold,eql -s default |
generate-alerts --environments |
π Multi-environment alerts | yarn start generate-alerts -n 100 --environments 50 --namespace prod |
generate-logs --environments |
π Multi-environment logs | yarn start generate-logs -n 1000 --environments 25 --namespace staging |
generate-campaign --realistic |
π Complete attack scenarios | yarn start generate-campaign apt --realistic --mitre |
--theme <theme> |
π¨ Theme-based data generation | yarn start generate-alerts -n 100 --theme marvel --mitre |
generate-fields |
π¬ Generate fields on demand | yarn start generate-fields -n 4000 --categories behavioral_analytics |
generate-alerts --multi-field |
π¬ Alerts with 10,000+ fields | yarn start generate-alerts -n 100 --multi-field --field-count 10000 |
--visual-analyzer |
ποΈ Visual Event Analyzer support | yarn start generate-alerts -n 50 --visual-analyzer --mitre |
--ai4soc --platform |
π’ AI4SOC platform alerts | yarn start generate-alerts -n 20 --ai4soc --platform splunk --mitre |
| Command | Description |
|---|---|
delete-alerts |
Clean up generated alerts |
delete-logs |
Clean up source logs |
delete-rules |
Clean up detection rules |
delete-cases |
Clean up security cases |
delete-knowledge-base |
Clean up knowledge base documents |
delete-ai4soc-mappings |
Clean up AI4SOC indices and templates |
delete-all |
Delete all generated data |
Transform boring test data into engaging, memorable scenarios while maintaining security realism:
# Marvel superhero-themed security data
yarn start generate-campaign apt --theme marvel --realistic --mitre
# Creates: tony.stark@starkindustries.com, shield-web-01, avengers-sql-02
# Star Wars-themed enterprise deployment
yarn start generate-alerts -n 100 --theme starwars --mitre --multi-field
# Creates: luke.skywalker@rebels.org, jedi-api-01, death-star-db-03
# NBA-themed SOC training environment
yarn start generate-logs -n 1000 --theme nba --types system,auth,network
# Creates: lebron.james@lakers.com, warriors-mail-01, bulls-app-02| Category | Themes | Example Data |
|---|---|---|
| Sports | nba, nfl, soccer, mlb |
lebron.james, patriots-web-01, messi.lionel |
| Entertainment | marvel, starwars, movies, tv_shows, anime |
tony.stark, jedi-db-02, naruto.uzumaki |
| Technology | tech_companies, programming |
satya.nadella, google-api-01, python-srv-03 |
| Culture | mythology, literature, history, music, food |
zeus.olympus, shakespeare-web-01, beethoven.ludwig |
Every aspect of your security data follows the selected theme:
| Data Type | Purpose | Example (Marvel Theme) |
|---|---|---|
| Usernames | User accounts, authentication logs | tony.stark, peter.parker, steve.rogers |
| Hostnames | Server names, network devices | iron-web-01, spider-db-02, shield-mail-03 |
| Full Names | Employee records, audit logs | Tony Stark, Peter Parker, Steve Rogers |
| Emails | Communication logs, phishing scenarios | tony.stark@starkindustries.com |
| Organizations | Company names, department data | Stark Industries Security, SHIELD Operations |
| Process Names | Endpoint security, malware analysis | StarkSecurityService, ShieldLogService |
| File Names | Document analysis, forensics | arc-reactor-plans.pdf, shield-protocols.doc |
| File Paths | System monitoring, file integrity | C:\Stark\Designs\mark42.dwg |
| Registry Keys | Windows forensics, persistence analysis | HKLM\Software\Stark\Armor |
| URLs | Web traffic analysis, threat hunting | /api/stark/inventory, /shield/classified |
| IP Addresses | Network analysis, threat intelligence | 192.168.10.1 (Stark HQ), 172.16.0.7 (SHIELD) |
| Application Names | Software inventory, security tools | Stark Analyzer, Shield Monitor |
| Service Names | Service monitoring, process analysis | AvengersNetService, GammaMonitorService |
| Event Descriptions | SIEM alerts, security notifications | Stark security protocol engaged |
yarn start generate-campaign apt --theme marvel --realistic --mitre --detection-rate 0.8Result: Complete APT scenario with Marvel-themed entities:
- Initial Access:
peter.parker@dailybugle.comreceives phishing email - Execution: Malware executes on
spider-web-01.dailybugle.com - Persistence: Registry key
HKLM\Software\WebSlinger\Configmodified - Collection: Data stolen from
C:\Stark\Classified\reactor-specs.pdf - Exfiltration: Data sent to external IP via
GammaMonitorService
yarn start generate-logs -n 2000 --theme soccer --types system,auth,network,endpointResult: Comprehensive logs with soccer theme:
- Authentication:
messi.lionelfailed login onbarcelona-dc-01 - Network: Suspicious traffic from
real-madrid-web-02to external IP - Process:
ChampionsLeagueServiceconsuming high CPU - File: Access denied to
\\fifa-share\world-cup-plans.xlsx
yarn start generate-alerts -n 500 --theme starwars --environments 10 --multi-field --field-count 300Result: 10 environments with consistent Star Wars theming:
- Environments:
jedi-env-001throughempire-env-010 - Hosts:
tatooine-web-01,coruscant-db-02,death-star-api-03 - Users:
luke.skywalker@rebels.org,vader@empire.gov - Enhanced Fields: 300 additional security fields per alert
Generate comprehensive security knowledge documents optimized for Elastic AI Assistant integration:
# Generate comprehensive security knowledge base
yarn start generate-knowledge-base -n 30 --categories threat_intelligence,incident_response,vulnerability_management
# High-confidence public security documentation
yarn start generate-knowledge-base -n 25 --access-level public --confidence-threshold 0.9
# Knowledge base with MITRE ATT&CK framework integration
yarn start generate-knowledge-base -n 20 --mitre --categories malware_analysis,forensicsthreat_intelligence- IOC analysis, APT profiles, campaign tracking, attributionincident_response- Playbooks, procedures, escalation matrices, communicationvulnerability_management- CVE analysis, patch management, assessment reportsnetwork_security- Firewall rules, IDS signatures, traffic analysis, DNS securityendpoint_security- EDR rules, behavioral patterns, process monitoringcloud_security- AWS/Azure/GCP security, container monitoring, serverless analyticscompliance- PCI DSS, SOX, GDPR, HIPAA, ISO27001 frameworksforensics- Memory analysis, disk forensics, network forensics, timeline analysismalware_analysis- Static/dynamic analysis, reverse engineering, sandbox reportsbehavioral_analytics- User analytics, entity analytics, anomaly detection
- ELSER v2 Integration: Semantic text fields optimized for AI Assistant
- Suggested Questions: AI-optimized questions for each document category
- MITRE ATT&CK Mapping: Technique and tactic associations
- Confidence Scoring: Quality assessment from 0.6-1.0
- Access Control: Multi-level restrictions (public, team, organization, restricted)
- Rich Console Output: Document titles, confidence indicators, and suggested questions
π Generated Knowledge Base Documents:
1. π₯ π₯ [threat_intelligence/ioc_analysis] IOC Analysis: MALWARE-7426
π¬ Suggested AI Assistant Questions:
1. What IOCs should we immediately block in our environment?
2. How confident are we in the attribution of this threat?
3. What detection rules should we create based on these indicators?
2. β
π’ [incident_response/playbooks] IR Playbook: Ransomware Incident Response
π¬ Suggested AI Assistant Questions:
1. What are the key decision points in this incident response process?
2. How do we customize this playbook for our environment?
3. What tools and resources are required for each phase?
π Full Knowledge Base Documentation β
Generate realistic, platform-specific security alerts for major SIEM and security platforms:
# Splunk alerts with MITRE integration
yarn start generate-alerts -n 15 --ai4soc --platform splunk --mitre
# SentinelOne alerts with themed data
yarn start generate-alerts -n 10 --ai4soc --platform sentinelone --theme marvel
# Google SecOps alerts with multi-field enrichment
yarn start generate-alerts -n 20 --ai4soc --platform google-secops --multi-field
# All platforms with complete integration
yarn start generate-alerts -n 30 --ai4soc --platform all --mitre --theme starwars| Platform | Format | Key Features | Example Use Case |
|---|---|---|---|
| Splunk | Event-based | Severity scoring, file access events, process execution | _time, event.title, severity_score, file_path |
| SentinelOne | Agent-centric | Process creation, threat classification, endpoint details | threatInfo, agentDetectionInfo, processDisplayName |
| Google SecOps | Finding-based | Asset information, security marks, risk scoring | alert.finding, entity.asset, riskScore |
# Setup AI4SOC indices and templates (one-time)
yarn start setup-ai4soc-mappings
# Check AI4SOC platform status
yarn start ai4soc-status
# Cleanup AI4SOC indices and templates
yarn start delete-ai4soc-mappingsEach platform creates dedicated indices for proper data organization:
- Splunk:
ai4soc-splunk-*β Raw events with severity scoring - SentinelOne:
ai4soc-sentinelone-*β Agent detection and threat data - Google SecOps:
ai4soc-google-secops-*β Findings with asset context - All Platforms:
ai4soc-*-*β Cross-platform analysis
# Generate training data across all platforms
yarn start generate-alerts -n 50 --ai4soc --platform all --mitre
# Platform-specific investigation scenarios
yarn start generate-alerts -n 25 --ai4soc --platform splunk --theme marvel --visual-analyzer
yarn start generate-alerts -n 25 --ai4soc --platform sentinelone --mitre --multi-field
yarn start generate-alerts -n 25 --ai4soc --platform google-secops --theme nba# Generate correlated alerts across platforms for same incident
for platform in splunk sentinelone google-secops; do
yarn start generate-alerts -n 10 --ai4soc --platform $platform --mitre --theme starwars
doneEach platform generates realistic security events:
| Event Type | Splunk Format | SentinelOne Format | Google SecOps Format |
|---|---|---|---|
| File Access | event.type: file_accessfile_path, access_type |
threatInfo.filePaththreatInfo.processDisplayName |
src_file.pathprocess.name |
| Process Creation | process_commandparent_process |
threatInfo.processDisplayNamethreatInfo.commandline |
process.command_lineparent_process.name |
| Network Access | network.src_ipnetwork.dest_port |
Container/K8s context | network.sourceIpnetwork.protocol |
Generate realistic ML training data for Elastic Security Machine Learning jobs across all security domains:
# Generate authentication anomaly data
yarn start generate-ml-data --modules security_auth,security_linux
# Complete ML workflow: create jobs + generate training data
yarn start generate-ml-data --modules security_auth,security_windows --enable-jobs
# Enterprise scale: all modules with performance optimization
yarn start generate-ml-data --modules security_auth,security_linux,security_windows,security_network,security_packetbeat,security_cloudtrail --chunk-size 5000security_auth- Authentication anomalies (rare users, failed logins, unusual timing)security_linux- Linux system anomalies (unusual users, sudo activity, network patterns)security_windows- Windows anomalies (process creation, runas events, script execution)security_cloudtrail- AWS CloudTrail anomalies (error patterns, API methods, geographic)security_network- Network anomalies (high volume, rare destinations, unusual processes)security_packetbeat- Traffic anomalies (DNS queries, server domains, URL patterns)
Integrate ML jobs directly with detection rule generation:
# Generate ML rules with automatic training data
yarn start rules -r 10 -t machine_learning --generate-ml-data --ml-modules security_auth,security_windows
# Complete ML-powered SOC setup: rules + jobs + data
yarn start rules -r 20 -t query,threshold,machine_learning --enable-ml-jobs --generate-ml-data --ml-modules security_auth,security_cloudtrail,security_network
# Enterprise ML testing across multiple spaces
yarn start rules -r 15 --enable-ml-jobs --generate-ml-data --ml-modules security_auth,security_windows,security_linux -s ml-testingrare- Detects rare field values (unusual usernames, rare processes)high_count- Identifies volume anomalies (authentication spikes, network floods)high_distinct_count- Finds diversity anomalies (error message variety)high_info_content- Detects entropy anomalies (encoded commands, scripts)time_of_day- Identifies temporal anomalies (unusual login hours)
- 21 Pre-built ML Jobs: Complete coverage across security domains
- Realistic Anomaly Injection: 0.02%-0.08% anomaly rates matching production
- Context-Aware Generation: Field patterns specific to security domains
- Enterprise Scale: Generate 100k+ documents with performance optimization
- Rule Integration: ML jobs automatically connected to detection rules
Generate alerts with correlated process events for Elastic Security's Visual Event Analyzer. Each alert includes matching process events that create complete process trees and attack visualizations.
# Generate alerts with Visual Event Analyzer support
yarn start generate-alerts -n 20 --visual-analyzer
# Combine with MITRE ATT&CK for realistic attack scenarios
yarn start generate-alerts -n 50 --visual-analyzer --mitre
# Generate attack campaigns with process visualization
yarn start generate-campaign apt --visual-analyzer --realistic
# Generate logs with Linux process hierarchies
yarn start generate-logs -n 100 --visual-analyzer --types endpointRealistic Linux attack scenarios with parent-child process relationships:
- π Privilege Escalation:
bash β sudo β su β bash - π Lateral Movement:
ssh β python3 β bash β nc - π Persistence:
crontab β vim β bash β crontab - π Discovery:
ps β netstat β find β cat - π€ Data Exfiltration:
find β tar β curl β rm
Generated data includes all required fields for Visual Event Analyzer functionality:
- β
agent.type: "endpoint"- Proper agent type configuration - β
process.entity_id- Unique process entity identifiers - β
event.category: "process"- Correct event categorization - β Alert correlation - Alerts reference existing process events
- β Process trees - Parent-child process relationships
- β MITRE mapping - ATT&CK technique associations
- Perfect Correlation: Each alert has matching process events with identical
process.entity_id - Realistic Process Chains: Linux-specific attack progression patterns
- Automatic Generation: Process events created automatically with alerts
- Multi-Environment Support: Works with
--environmentsflag for scale testing - MITRE Integration: Process chains mapped to proper ATT&CK techniques
After generation, alerts in Kibana Security will show:
- β Visual Event Analyzer icon in the alerts table
- β Process tree visualization when clicking the analyzer icon
- β Complete attack chains with process relationships
- β Linux process hierarchies showing realistic attack progression
# Realistic APT campaign: 18 source logs β 0 detected alerts (stealth attack)
yarn start generate-campaign apt --realistic --mitre --logs-per-stage 3 --detection-rate 0.3
# Ransomware outbreak: 38 source logs β 12 detected alerts (high visibility)
yarn start generate-campaign ransomware --realistic --mitre --logs-per-stage 2 --detection-rate 0.8
# Insider threat: Gradual privilege abuse with low detection
yarn start generate-campaign insider --realistic --mitre --detection-rate 0.2
# π¬ Enhanced with Multi-Field Generation
# APT campaign with 400 additional behavioral and threat intelligence fields
yarn start generate-campaign apt --realistic --mitre --multi-field --field-count 400 \
--field-categories behavioral_analytics,threat_intelligence,endpoint_analytics
# Ransomware with full security context (500+ fields per event)
yarn start generate-campaign ransomware --realistic --mitre --multi-field --field-count 500- Source Logs: Realistic Windows/Linux logs that tell the attack story
- Triggered Alerts: Security alerts generated from suspicious log patterns
- Missed Activities: Realistic gaps in detection (like real SOCs)
- Investigation Timeline: Chronological attack progression
- Investigation Guide: Step-by-step analysis recommendations
π Realistic Campaign Generated Successfully:
π― Attack Stages: 8
βοΈ Campaign: Conti Enterprise Ransomware Campaign
π Threat Actor: Conti
π Total Logs: 38
π¨ Detected Alerts: 12
βͺ Missed Activities: 2
π
Timeline: 45 events
π Investigation Guide:
1. Review initial alerts and identify affected systems
2. Investigate supporting logs around alert times
3. Look for lateral movement and persistence
π View in Kibana space: default
π Filter logs with: logs-*
π¨ View alerts in Security app
π 12 alerts triggered by 38 source logs
Create config.json with your connection and AI provider settings:
Secure authentication for Elastic Cloud, Serverless, and production environments:
{
"elastic": {
"node": "https://your-cluster.es.us-west2.gcp.elastic-cloud.com",
"apiKey": "VnVhQ2ZHY0JDdbkQm-e5aM..."
},
"kibana": {
"node": "https://your-kibana.kb.us-west2.gcp.elastic-cloud.com:9243",
"apiKey": "VnVhQ2ZHY0JDdbkQm-e5aM..."
},
"serverless": true
}π How to obtain API keys:
- Elastic Cloud: Stack Management β Security β API Keys β Create API Key
- Kibana Dev Tools:
POST /_security/api_key { "name": "security-docs-generator", "role_descriptors": { "security_role": { "cluster": ["all"], "index": [{"names": ["*"], "privileges": ["all"]}] } } } - Serverless: Use the pre-configured service tokens from your serverless environment
For local development and self-hosted deployments:
{
"elastic": {
"node": "http://localhost:9200",
"username": "elastic",
"password": "changeme"
},
"kibana": {
"node": "http://localhost:5601",
"username": "elastic",
"password": "changeme"
}
}For local serverless development (using yarn es serverless):
{
"elastic": {
"node": "https://localhost:9200",
"username": "elastic_serverless",
"password": "changeme"
},
"kibana": {
"node": "https://localhost:5601",
"apiKey": "AAEAAWVsYXN0aWMva2liYW5hL2tpYmFuYS1kZXY6VVVVVVVVTEstKiBaNA"
},
"serverless": true
}{
"elastic": { "node": "https://your-cluster.com", "apiKey": "..." },
"kibana": { "node": "https://your-kibana.com", "apiKey": "..." },
"useAI": true,
"openaiApiKey": "sk-..."
}{
"elastic": { "node": "https://your-cluster.com", "apiKey": "..." },
"kibana": { "node": "https://your-kibana.com", "apiKey": "..." },
"useAI": true,
"useClaudeAI": true,
"claudeApiKey": "sk-ant-..."
}{
"elastic": { "node": "https://your-cluster.com", "apiKey": "..." },
"kibana": { "node": "https://your-kibana.com", "apiKey": "..." },
"useAI": true,
"useAzureOpenAI": true,
"azureOpenAIApiKey": "...",
"azureOpenAIEndpoint": "https://your-resource.openai.azure.com/",
"azureOpenAIDeployment": "gpt-4"
}| Type | Attack Stages | Key Characteristics | Detection Rate |
|---|---|---|---|
| APT | 2-4 stages | Stealth, lateral movement, long-term | Low (0.2-0.4) |
| Ransomware | 8 stages | Fast progression, high impact | High (0.6-0.9) |
| Insider | 3-6 stages | Privilege abuse, data exfiltration | Medium (0.3-0.6) |
| Supply Chain | 4-7 stages | External compromise, multiple victims | Medium (0.4-0.7) |
# High detection environment (well-monitored SOC)
yarn start generate-campaign apt --realistic --detection-rate 0.8 --logs-per-stage 5
# Stealth attack (limited visibility)
yarn start generate-campaign apt --realistic --detection-rate 0.2 --logs-per-stage 8
# Large-scale incident
yarn start generate-campaign ransomware --realistic --events 50 --targets 20 --logs-per-stage 10In Kibana:
- Logs: Filter by
logs-*to see all source logs - Alerts: Check Security app for triggered alerts
- Timeline: View chronological attack progression
- Correlation: Follow investigation guide recommendations
Key Investigation Queries:
# View all logs from affected hosts
host.name:(ws-123 OR srv-456) AND @timestamp:[now-24h TO now]
# Find authentication events around alert times
event.category:authentication AND event.outcome:success
# Look for lateral movement indicators
event.category:network AND destination.ip:10.* AND source.ip:external
| Topic | Description |
|---|---|
| π‘οΈ Detection Rules Generation | All 7 rule types with triggered alerts β |
| π Kibana Cloud Integration | Direct Security β Alerts integration β |
| π¨ Theme-Based Generation | Consistent themed security data |
| Multi-Field Generation | 500+ security fields, zero tokens |
| π€ Machine Learning Integration | ML anomaly detection and training data |
| Use Cases Guide | Enterprise scenarios and workflows |
| False Positives | Detection rule testing and SOC training |
| Attack Campaigns | Campaign generation guide |
| MITRE ATT&CK | Framework integration |
| AI Integration | AI providers and setup |
| Configuration | System configuration |
| API Reference | Complete API documentation |
- Realistic Training: Complete attack scenarios with proper evidence chains
- Detection Testing: Validate rules against realistic attack patterns with 500+ contextual fields
- SOC Training: Practice investigation workflows on believable data with rich telemetry
- Enhanced Context: Multi-field generation provides comprehensive security analytics
- Integration Testing: Test security tools with realistic data volumes and field diversity
- Performance Testing: Validate systems under realistic security loads with hundreds of fields
- Rule Development: Create detection rules with comprehensive test data
- Cost Efficiency: 99% token reduction while maintaining data richness
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests and documentation
- Submit a pull request
MIT License - see LICENSE for details.
π Ready to simulate realistic security incidents? Start with:
# Complete attack scenario with forensic evidence chains
yarn start generate-campaign ransomware --realistic --mitre
# Enhanced with 300 additional security fields (99% faster, zero tokens)
yarn start generate-campaign ransomware --realistic --mitre --multi-field --field-count 300
# π¨ Marvel-themed SOC training with realistic attack progression
yarn start generate-campaign apt --theme marvel --realistic --mitre --multi-field --field-count 400π¬ Experience the power of multi-field generation! Generate hundreds of contextual security fields in milliseconds with zero AI overhead.