diff --git a/datasets/attack_techniques/T1003/test/sysmon.xml b/datasets/attack_techniques/T1003/test/sysmon.xml
new file mode 100644
index 00000000..ff886229
--- /dev/null
+++ b/datasets/attack_techniques/T1003/test/sysmon.xml
@@ -0,0 +1,5 @@
+22542200x8000000000000000135299Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-29 16:27:44.841{2d9b1c52-4086-6902-78d0-010000006903}260_ldap._tcp.dc._msdcs.WORKGROUP9003-C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exeNT AUTHORITY\SYSTEM
+154100x8000000000000000135298Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-29 16:27:50.780{2d9b1c52-4086-6902-79d0-010000006903}1824C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe9.3.0Registry monitorsplunk ApplicationSplunk Inc.splunk-regmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=F1B469DA7803AFE04870B4871CC0F695,SHA256=8198111A755A6918B5559B548574061A41EF5AACAE706DD154936CFEC6E6432E,IMPHASH=AEB21630574EF01A3A5116CB58C5AC56{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM
+154100x8000000000000000135297Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-29 16:27:50.024{2d9b1c52-4086-6902-78d0-010000006903}260C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe9.3.0Active Directory monitorsplunk ApplicationSplunk Inc.splunk-admon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=DBFD61F6BB7B564B6D2E8C43BDCFA36B,SHA256=CE85AA468CE40D8463CE0B8E5320637BD87C9A0702F8B0BD35A40F93D146E80B,IMPHASH=623F6CD6D62EAC500E2DDE74F881F752{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM
+4688201331200x8020000000000000292574Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x720C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level
+4688201331200x8020000000000000292573Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x104C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level
diff --git a/datasets/attack_techniques/T1003/test/test.yml b/datasets/attack_techniques/T1003/test/test.yml
new file mode 100644
index 00000000..c0781282
--- /dev/null
+++ b/datasets/attack_techniques/T1003/test/test.yml
@@ -0,0 +1,13 @@
+author: PB
+id: 791b8984-9559-44f5-9871-afcdd7d8cc52
+date: '2025-10-29'
+description: Attack data for technique T1003
+environment: attack_range
+directory: test
+mitre_technique:
+- T1003
+datasets:
+- name: sysmon
+ path: datasets/attack_techniques/T1003/test/sysmon.xml
+ sourcetype: test
+ source: Sysmon