Change order of techniques in ATT&CK matrix

T1158: Hidden files before T1504: Powershell profile
This commit is contained in:
Shreya 2020-06-24 15:19:07 +05:30
parent 6b75092823
commit 971a102eb6
1 changed files with 10 additions and 10 deletions

View File

@ -90,6 +90,16 @@ SCHEMA = {
"description": "Adversaries with a sufficient level of access " "description": "Adversaries with a sufficient level of access "
"may create a local system, domain, or cloud tenant account." "may create a local system, domain, or cloud tenant account."
}, },
"T1158": {
"title": "Hidden files and directories",
"type": "bool",
"value": True,
"necessary": False,
"link": "https://attack.mitre.org/techniques/T1158",
"description": "Adversaries can hide files and folders on the system "
"and evade a typical user or system analysis that does not "
"incorporate investigation of hidden files."
},
"T1504": { "T1504": {
"title": "PowerShell profile", "title": "PowerShell profile",
"type": "bool", "type": "bool",
@ -99,16 +109,6 @@ SCHEMA = {
"description": "Adversaries may gain persistence and elevate privileges " "description": "Adversaries may gain persistence and elevate privileges "
"in certain situations by abusing PowerShell profiles which " "in certain situations by abusing PowerShell profiles which "
"are scripts that run when PowerShell starts." "are scripts that run when PowerShell starts."
},
"T1158": {
"title": "Hidden Files and Directories",
"type": "bool",
"value": True,
"necessary": False,
"link": "https://attack.mitre.org/techniques/T1158",
"description": "Adversaries can hide files and folders on the system "
"and evade a typical user or system analysis that does not "
"incorporate investigation of hidden files."
} }
} }
}, },