diff --git a/datasets/attack_techniques/T1003/test/sysmon.xml b/datasets/attack_techniques/T1003/test/sysmon.xml new file mode 100644 index 00000000..ff886229 --- /dev/null +++ b/datasets/attack_techniques/T1003/test/sysmon.xml @@ -0,0 +1,5 @@ +22542200x8000000000000000135299Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-29 16:27:44.841{2d9b1c52-4086-6902-78d0-010000006903}260_ldap._tcp.dc._msdcs.WORKGROUP9003-C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exeNT AUTHORITY\SYSTEM +154100x8000000000000000135298Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-29 16:27:50.780{2d9b1c52-4086-6902-79d0-010000006903}1824C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe9.3.0Registry monitorsplunk ApplicationSplunk Inc.splunk-regmon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=F1B469DA7803AFE04870B4871CC0F695,SHA256=8198111A755A6918B5559B548574061A41EF5AACAE706DD154936CFEC6E6432E,IMPHASH=AEB21630574EF01A3A5116CB58C5AC56{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +154100x8000000000000000135297Microsoft-Windows-Sysmon/Operationalar-win-1-2025-10-29 16:27:50.024{2d9b1c52-4086-6902-78d0-010000006903}260C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe9.3.0Active Directory monitorsplunk ApplicationSplunk Inc.splunk-admon.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe"C:\Windows\system32\NT AUTHORITY\SYSTEM{2d9b1c52-0eab-68f1-e703-000000000000}0x3e70SystemMD5=DBFD61F6BB7B564B6D2E8C43BDCFA36B,SHA256=CE85AA468CE40D8463CE0B8E5320637BD87C9A0702F8B0BD35A40F93D146E80B,IMPHASH=623F6CD6D62EAC500E2DDE74F881F752{2d9b1c52-0eb0-68f1-3b00-000000006903}2452C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe"C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe" serviceNT AUTHORITY\SYSTEM +4688201331200x8020000000000000292574Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x720C:\Program Files\SplunkUniversalForwarder\bin\splunk-regmon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level +4688201331200x8020000000000000292573Securityar-win-1NT AUTHORITY\SYSTEMAR-WIN-1$WORKGROUP0x3e70x104C:\Program Files\SplunkUniversalForwarder\bin\splunk-admon.exe%%19360x994NULL SID--0x0C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exeMandatory Label\System Mandatory Level diff --git a/datasets/attack_techniques/T1003/test/test.yml b/datasets/attack_techniques/T1003/test/test.yml new file mode 100644 index 00000000..c0781282 --- /dev/null +++ b/datasets/attack_techniques/T1003/test/test.yml @@ -0,0 +1,13 @@ +author: PB +id: 791b8984-9559-44f5-9871-afcdd7d8cc52 +date: '2025-10-29' +description: Attack data for technique T1003 +environment: attack_range +directory: test +mitre_technique: +- T1003 +datasets: +- name: sysmon + path: datasets/attack_techniques/T1003/test/sysmon.xml + sourcetype: test + source: Sysmon