From fb255aa86adaebd0fc671910d4a369bd8e5443d6 Mon Sep 17 00:00:00 2001 From: P4T12ICK Date: Fri, 24 Oct 2025 16:15:43 +0200 Subject: [PATCH 1/2] Update YAML metadata for T1003 --- .../T1003.002/atomic_red_team/atomic_red_team.yml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml b/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml index 5b52451b..9c956d8e 100644 --- a/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml +++ b/datasets/attack_techniques/T1003.002/atomic_red_team/atomic_red_team.yml @@ -17,3 +17,7 @@ datasets: path: /datasets/attack_techniques/T1003.002/atomic_red_team/windows-sysmon.log sourcetype: XmlWinEventLog source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational +- name: sysmon + path: datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log + sourcetype: XmlWinEventLog + source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational From 3bf8bbe6d3d1c035ee55acbcdd0aa8960d792e7d Mon Sep 17 00:00:00 2001 From: P4T12ICK Date: Fri, 24 Oct 2025 16:15:44 +0200 Subject: [PATCH 2/2] Add attack data for T1003 --- .../T1003.002/atomic_red_team/sysmon.log | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log diff --git a/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log b/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log new file mode 100644 index 00000000..cf9bdb4c --- /dev/null +++ b/datasets/attack_techniques/T1003.002/atomic_red_team/sysmon.log @@ -0,0 +1,10 @@ +4688201331200x8020000000000000246318Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70xfe8C:\Windows\System32\wbem\WmiPrvSE.exe%%19360x310NULL SIDAR-WIN-1$WORKGROUP0x3e4C:\Windows\System32\svchost.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000246317Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x74C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000083619Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:14:51.750{2d9b1c52-89db-68fb-221d-010000006903}116C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe9.3.0Registry monitorsplunk ApplicationSplunk Inc.splunk-regmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=F1B469DA7803AFE04870B4871CC0F695,SHA256=8198111A755A6918B5559B548574061A41EF5AACAE706DD154936CFEC6E6432E,IMPHASH=AEB21630574EF01A3A5116CB58C5AC56{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +22542200x800000000000000083618Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:14:45.548{2d9b1c52-89d8-68fb-1e1d-010000006903}5092_ldap._tcp.dc._msdcs.WORKGROUP9003-C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exeNT AUTHORITY\SYSTEM +154100x800000000000000083617Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:14:50.999{2d9b1c52-89da-68fb-211d-010000006903}2276C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe9.3.0Network monitorSplunk ApplicationSplunk Inc.splunk-netmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=E30CB50BE9EC2FB49497F136DC71448F,SHA256=7835B39374396001E12637509AE0D22FCB7E2A89F6143DED03186B500276E537,IMPHASH=D30C8E545B1C24DE4E0DC100EF70F2D0{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000246316Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x8e4C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000246315Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x8c8C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000083616Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:14:50.249{2d9b1c52-89da-68fb-201d-010000006903}2248C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe-----"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe" --ps2C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=FCB0604926A81A7A7746B7066B286DC8,SHA256=211CC17F7C47B5CCF2B980A2091D392C73C9ABADDB1061CE419C5357DD5545C2,IMPHASH=44A0061B15025B4FBD3C0D7BCF7E24E9{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000246314Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x13ccC:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +154100x800000000000000083615Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-24 14:14:49.499{2d9b1c52-89d9-68fb-1f1d-010000006903}5068C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe10.0.10011.16384SplunkMonNoHandle Control ProgramWindows (R) Win 7 DDK driverWindows (R) Win 7 DDK providerSplunkMonNoHandle.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=509F459BAA92E3C3D2B8AF2ABEE90640,SHA256=12576AFDC3B84FA47162F3FE31DC926B5B1F82EC1B4A4721A656274275CB7B20,IMPHASH=AA49C0FBBD591DE7932A03B49B088142{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM