diff --git a/attack_data/datasets/attack_techniques/T1003/test2/sysmon.log b/attack_data/datasets/attack_techniques/T1003/test2/sysmon.log new file mode 100644 index 00000000..66fe6692 --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003/test2/sysmon.log @@ -0,0 +1,5 @@ +4688201331200x8020000000000000244536Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xe98C:\Windows\System32\wbem\WmiPrvSE.exe%%19360x310NULL SIDAR-WIN-1$WORKGROUP0x3e4C:\Windows\System32\svchost.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000244535Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xd30C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000081625Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 09:30:49.915{2d9b1c52-4749-68fb-3816-010000006903}3376C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe9.3.0Registry monitorsplunk ApplicationSplunk Inc.splunk-regmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=F1B469DA7803AFE04870B4871CC0F695,SHA256=8198111A755A6918B5559B548574061A41EF5AACAE706DD154936CFEC6E6432E,IMPHASH=AEB21630574EF01A3A5116CB58C5AC56{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +22542200x800000000000000081624Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 09:30:43.310{2d9b1c52-4746-68fb-3416-010000006903}1528_ldap._tcp.dc._msdcs.WORKGROUP9003-C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exeNT AUTHORITY\SYSTEM +4688201331200x8020000000000000244534Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x113cC:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level diff --git a/attack_data/datasets/attack_techniques/T1003/test2/test2.yml b/attack_data/datasets/attack_techniques/T1003/test2/test2.yml new file mode 100644 index 00000000..927a1e70 --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003/test2/test2.yml @@ -0,0 +1,13 @@ +author: Patrick Bareiss +id: 8c1cb2d0-cb22-4c8e-9f06-a41c70e6fe5f +date: '2025-10-24' +description: Attack data for technique T1003 +environment: attack_range +directory: attack_techniques +mitre_technique: +- T1003 +datasets: +- name: sysmon + path: attack_data/datasets/attack_techniques/T1003/test2/sysmon.log + sourcetype: XmlWinEventLog + source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational