diff --git a/attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml b/attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml new file mode 100644 index 00000000..251b08f3 --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml @@ -0,0 +1,13 @@ +author: PB +id: 254547bf-ca0a-46e5-91a4-631d712f91c2 +date: '2025-10-24' +description: Attack data for technique T1003 +environment: attack_range +directory: atomic_red_team +mitre_technique: +- T1003 +datasets: +- name: sysmon + path: attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log + sourcetype: XmlWinEventLog + source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational diff --git a/attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log b/attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log new file mode 100644 index 00000000..2916215e --- /dev/null +++ b/attack_data/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log @@ -0,0 +1,10 @@ +4688201331200x8020000000000000246274Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x1050C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000083570Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:07:52.091{2d9b1c52-8838-68fb-f71c-010000006903}4176C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe9.3.0Network monitorSplunk ApplicationSplunk Inc.splunk-netmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=E30CB50BE9EC2FB49497F136DC71448F,SHA256=7835B39374396001E12637509AE0D22FCB7E2A89F6143DED03186B500276E537,IMPHASH=D30C8E545B1C24DE4E0DC100EF70F2D0{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000246273Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x1220C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000083569Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:07:51.341{2d9b1c52-8837-68fb-f61c-010000006903}4640C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe9.3.0Registry monitorsplunk ApplicationSplunk Inc.splunk-regmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=F1B469DA7803AFE04870B4871CC0F695,SHA256=8198111A755A6918B5559B548574061A41EF5AACAE706DD154936CFEC6E6432E,IMPHASH=AEB21630574EF01A3A5116CB58C5AC56{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +22542200x800000000000000083568Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:07:44.782{2d9b1c52-8834-68fb-f21c-010000006903}4692_ldap._tcp.dc._msdcs.WORKGROUP9003-C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exeNT AUTHORITY\SYSTEM +154100x800000000000000083567Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:07:50.429{2d9b1c52-8836-68fb-f51c-010000006903}4772C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe-----"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe" --ps2C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=FCB0604926A81A7A7746B7066B286DC8,SHA256=211CC17F7C47B5CCF2B980A2091D392C73C9ABADDB1061CE419C5357DD5545C2,IMPHASH=44A0061B15025B4FBD3C0D7BCF7E24E9{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000246272Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x12a4C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000083566Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:07:49.680{2d9b1c52-8835-68fb-f41c-010000006903}2788C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe-----"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=FCB0604926A81A7A7746B7066B286DC8,SHA256=211CC17F7C47B5CCF2B980A2091D392C73C9ABADDB1061CE419C5357DD5545C2,IMPHASH=44A0061B15025B4FBD3C0D7BCF7E24E9{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000246271Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xae4C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000246270Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x13d0C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level