Data included in the hack was IT management software, monitoring logs, and other auditing tools.