Skip to content

Commit 7408a9b

Browse files
committed
Add YAML metadata for T1003.003
1 parent 4e5214f commit 7408a9b

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
author: PB
2+
id: b6ed453c-c5e3-496f-b6f7-7dc365e984ba
3+
date: '2025-11-12'
4+
description: Attack data for detection Credential Dumping via Symlink to Shadow Copy
5+
New
6+
environment: attack_range
7+
directory: credential-dumping-via-symlink
8+
mitre_technique:
9+
- T1003.003
10+
datasets:
11+
- name: data
12+
path: datasets/attack_techniques/T1003.003/credential-dumping-via-symlink/data.log
13+
sourcetype: XmlWinEventLog
14+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

0 commit comments

Comments
 (0)