forked from p15670423/monkey
Add techniques' info to attack_schema
This commit is contained in:
parent
9307d874c5
commit
37b4717eb1
|
@ -109,6 +109,16 @@ SCHEMA = {
|
||||||
"and evade a typical user or system analysis that does not "
|
"and evade a typical user or system analysis that does not "
|
||||||
"incorporate investigation of hidden files."
|
"incorporate investigation of hidden files."
|
||||||
},
|
},
|
||||||
|
"T1168": {
|
||||||
|
"title": "Local job scheduling",
|
||||||
|
"type": "bool",
|
||||||
|
"value": True,
|
||||||
|
"necessary": False,
|
||||||
|
"link": "https://attack.mitre.org/techniques/T1168/",
|
||||||
|
"description": "Linux supports multiple methods for creating pre-scheduled and "
|
||||||
|
"periodic background jobs. Job scheduling can be used by adversaries to "
|
||||||
|
"schedule running malicious code at some specified date and time."
|
||||||
|
},
|
||||||
"T1504": {
|
"T1504": {
|
||||||
"title": "PowerShell profile",
|
"title": "PowerShell profile",
|
||||||
"type": "bool",
|
"type": "bool",
|
||||||
|
@ -119,6 +129,16 @@ SCHEMA = {
|
||||||
"in certain situations by abusing PowerShell profiles which "
|
"in certain situations by abusing PowerShell profiles which "
|
||||||
"are scripts that run when PowerShell starts."
|
"are scripts that run when PowerShell starts."
|
||||||
},
|
},
|
||||||
|
"T1053": {
|
||||||
|
"title": "Scheduled task",
|
||||||
|
"type": "bool",
|
||||||
|
"value": True,
|
||||||
|
"necessary": False,
|
||||||
|
"link": "https://attack.mitre.org/techniques/T1053",
|
||||||
|
"description": "Windows utilities can be used to schedule programs or scripts to "
|
||||||
|
"be executed at a date and time. An adversary may use task scheduling to "
|
||||||
|
"execute programs at system startup or on a scheduled basis for persistence."
|
||||||
|
},
|
||||||
"T1166": {
|
"T1166": {
|
||||||
"title": "Setuid and Setgid",
|
"title": "Setuid and Setgid",
|
||||||
"type": "bool",
|
"type": "bool",
|
||||||
|
|
Loading…
Reference in New Issue