diff --git a/attack_data/datasets/attack_techniques/T1003/test5/sysmon.log b/attack_data/datasets/attack_techniques/T1003/test5/sysmon.log new file mode 100644 index 00000000..93086b04 --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003/test5/sysmon.log @@ -0,0 +1,10 @@ +154100x800000000000000081861Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 10:04:48.444{2d9b1c52-4f40-68fb-0917-010000006903}1912C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe-----"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe" --ps2C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=FCB0604926A81A7A7746B7066B286DC8,SHA256=211CC17F7C47B5CCF2B980A2091D392C73C9ABADDB1061CE419C5357DD5545C2,IMPHASH=44A0061B15025B4FBD3C0D7BCF7E24E9{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +22542200x800000000000000081860Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 10:04:42.749{2d9b1c52-4f3e-68fb-0617-010000006903}2956_ldap._tcp.dc._msdcs.WORKGROUP9003-C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exeNT AUTHORITY\SYSTEM +4688201331200x8020000000000000244744Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x778C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000081859Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 10:04:47.693{2d9b1c52-4f3f-68fb-0817-010000006903}3824C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe10.0.10011.16384SplunkMonNoHandle Control ProgramWindows (R) Win 7 DDK driverWindows (R) Win 7 DDK providerSplunkMonNoHandle.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=509F459BAA92E3C3D2B8AF2ABEE90640,SHA256=12576AFDC3B84FA47162F3FE31DC926B5B1F82EC1B4A4721A656274275CB7B20,IMPHASH=AA49C0FBBD591DE7932A03B49B088142{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000244743Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xef0C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000244742Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xba8C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000244741Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xb8cC:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000081858Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 10:04:46.914{2d9b1c52-4f3e-68fb-0717-010000006903}2984C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe-----"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=FCB0604926A81A7A7746B7066B286DC8,SHA256=211CC17F7C47B5CCF2B980A2091D392C73C9ABADDB1061CE419C5357DD5545C2,IMPHASH=44A0061B15025B4FBD3C0D7BCF7E24E9{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +154100x800000000000000081857Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 10:04:46.148{2d9b1c52-4f3e-68fb-0617-010000006903}2956C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe9.3.0Active Directory monitorsplunk ApplicationSplunk Inc.splunk-admon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=DBFD61F6BB7B564B6D2E8C43BDCFA36B,SHA256=CE85AA468CE40D8463CE0B8E5320637BD87C9A0702F8B0BD35A40F93D146E80B,IMPHASH=623F6CD6D62EAC500E2DDE74F881F752{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +154100x800000000000000081856Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 10:03:50.068{2d9b1c52-4f06-68fb-0517-010000006903}264C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe9.3.0Network monitorSplunk ApplicationSplunk Inc.splunk-netmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=E30CB50BE9EC2FB49497F136DC71448F,SHA256=7835B39374396001E12637509AE0D22FCB7E2A89F6143DED03186B500276E537,IMPHASH=D30C8E545B1C24DE4E0DC100EF70F2D0{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM diff --git a/attack_data/datasets/attack_techniques/T1003/test5/test5.yml b/attack_data/datasets/attack_techniques/T1003/test5/test5.yml new file mode 100644 index 00000000..4c97173a --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003/test5/test5.yml @@ -0,0 +1,13 @@ +author: PB +id: 045e120a-1943-4f38-ba38-d9fc8da660d6 +date: '2025-10-24' +description: Attack data for technique T1003 +environment: attack_range +directory: test5 +mitre_technique: +- T1003 +datasets: +- name: sysmon + path: attack_data/datasets/attack_techniques/T1003/test5/sysmon.log + sourcetype: XmlWinEventLog + source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational