From 97408b054b2fb112b7b88066ae3687e9350006d4 Mon Sep 17 00:00:00 2001 From: P4T12ICK Date: Fri, 24 Oct 2025 11:18:41 +0200 Subject: [PATCH 1/2] Add YAML metadata for T1003 --- .../datasets/attack_techniques/T1003/test/test.yml | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 attack_data/datasets/attack_techniques/T1003/test/test.yml diff --git a/attack_data/datasets/attack_techniques/T1003/test/test.yml b/attack_data/datasets/attack_techniques/T1003/test/test.yml new file mode 100644 index 00000000..b3c9814f --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003/test/test.yml @@ -0,0 +1,13 @@ +author: Patrick Bareiss +id: 90ba20be-803c-4770-ac7e-05f818a7bdaf +date: '2025-10-24' +description: Attack data for technique T1003 +environment: attack_range +directory: attack_techniques +mitre_technique: +- T1003 +datasets: +- name: sysmon + path: /datasets/attack_techniques/T1003/attack_techniques/sysmon.log + sourcetype: XmlWinEventLog + source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational From 44d4c4845351d6da1746882b19a0e59319151fed Mon Sep 17 00:00:00 2001 From: P4T12ICK Date: Fri, 24 Oct 2025 11:18:42 +0200 Subject: [PATCH 2/2] Add attack data for T1003 --- attack_data/datasets/attack_techniques/T1003/test/sysmon.log | 1 + 1 file changed, 1 insertion(+) create mode 100644 attack_data/datasets/attack_techniques/T1003/test/sysmon.log diff --git a/attack_data/datasets/attack_techniques/T1003/test/sysmon.log b/attack_data/datasets/attack_techniques/T1003/test/sysmon.log new file mode 100644 index 00000000..69d6266a --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003/test/sysmon.log @@ -0,0 +1 @@ +"154100x800000000000000081533Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 09:17:49.733{2d9b1c52-443d-68fb-e715-010000006903}736C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-netmon.exe9.3.0Network monitorSplunk ApplicationSplunk Inc.splunk-netmon.exe\"C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-netmon.exe\"C:\\Windows\\system32\\NT AUTHORITY\\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=E30CB50BE9EC2FB49497F136DC71448F,SHA256=7835B39374396001E12637509AE0D22FCB7E2A89F6143DED03186B500276E537,IMPHASH=D30C8E545B1C24DE4E0DC100EF70F2D0{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe\"C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe\" serviceNT AUTHORITY\\SYSTEM\n4688201331200x8020000000000000244452Securityar-win-1NT AUTHORITY\\SYSTEMAR-WIN-1$WORKGROUP0x3e70x2e0C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-netmon.exe%%19360x994NULL SID--0x0C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exeMandatory Label\\System Mandatory Level\n4688201331200x8020000000000000244451Securityar-win-1NT AUTHORITY\\SYSTEMAR-WIN-1$WORKGROUP0x3e70x8e8C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-regmon.exe%%19360x994NULL SID--0x0C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exeMandatory Label\\System Mandatory Level\n154100x800000000000000081532Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 09:17:48.983{2d9b1c52-443c-68fb-e615-010000006903}2280C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-regmon.exe9.3.0Registry monitorsplunk ApplicationSplunk Inc.splunk-regmon.exe\"C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-regmon.exe\"C:\\Windows\\system32\\NT AUTHORITY\\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=F1B469DA7803AFE04870B4871CC0F695,SHA256=8198111A755A6918B5559B548574061A41EF5AACAE706DD154936CFEC6E6432E,IMPHASH=AEB21630574EF01A3A5116CB58C5AC56{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe\"C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe\" serviceNT AUTHORITY\\SYSTEM\n154100x800000000000000081531Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 09:17:48.075{2d9b1c52-443c-68fb-e515-010000006903}4948C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-powershell.exe-----\"C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunk-powershell.exe\" --ps2C:\\Windows\\system32\\NT AUTHORITY\\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=FCB0604926A81A7A7746B7066B286DC8,SHA256=211CC17F7C47B5CCF2B980A2091D392C73C9ABADDB1061CE419C5357DD5545C2,IMPHASH=44A0061B15025B4FBD3C0D7BCF7E24E9{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe\"C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe\" serviceNT AUTHORITY\\SYSTEM\n" \ No newline at end of file