From 971a102eb6d066a228d2fb92f810f83084ebd2ae Mon Sep 17 00:00:00 2001
From: Shreya <shreya.malviya@gmail.com>
Date: Wed, 24 Jun 2020 15:19:07 +0530
Subject: [PATCH] Change order of techniques in ATT&CK matrix

T1158: Hidden files before T1504: Powershell profile
---
 .../cc/services/attack/attack_schema.py       | 20 +++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/monkey/monkey_island/cc/services/attack/attack_schema.py b/monkey/monkey_island/cc/services/attack/attack_schema.py
index 04c63a850..c70ff2a70 100644
--- a/monkey/monkey_island/cc/services/attack/attack_schema.py
+++ b/monkey/monkey_island/cc/services/attack/attack_schema.py
@@ -90,6 +90,16 @@ SCHEMA = {
                     "description": "Adversaries with a sufficient level of access "
                                    "may create a local system, domain, or cloud tenant account."
                 },
+                "T1158": {
+                    "title": "Hidden files and directories",
+                    "type": "bool",
+                    "value": True,
+                    "necessary": False,
+                    "link": "https://attack.mitre.org/techniques/T1158",
+                    "description": "Adversaries can hide files and folders on the system "
+                                   "and evade a typical user or system analysis that does not "
+                                   "incorporate investigation of hidden files."
+                },
                 "T1504": {
                     "title": "PowerShell profile",
                     "type": "bool",
@@ -99,16 +109,6 @@ SCHEMA = {
                     "description": "Adversaries may gain persistence and elevate privileges "
                                    "in certain situations by abusing PowerShell profiles which "
                                    "are scripts that run when PowerShell starts."
-                },
-                "T1158": {
-                    "title": "Hidden Files and Directories",
-                    "type": "bool",
-                    "value": True,
-                    "necessary": False,
-                    "link": "https://attack.mitre.org/techniques/T1158",
-                    "description": "Adversaries can hide files and folders on the system "
-                                   "and evade a typical user or system analysis that does not "
-                                   "incorporate investigation of hidden files."
                 }
             }
         },