Skip to content

Commit 1a637d7

Browse files
committed
Removed more offending IDs
1 parent 636840c commit 1a637d7

File tree

3 files changed

+2
-25
lines changed

3 files changed

+2
-25
lines changed

local/macros.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
[get_attack_data]
2-
definition = index="attack" Technique!="Technique" Technique!="" Technique!="T1531"
2+
definition = index="attack" Technique!="Technique" Technique!="" Technique!="T1531" Technique!="T1482" Technique!="T1485" Technique!="T1489" Technique!="T1490" Technique!="T1500" Technique!="T1502" Technique!="T1504" Technique!="T1505" Technique!="T1518" Technique!="T1529"
33
iseval = 0

lookups/windows-atomic-red-tests.csv

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ defense-evasion,T1088,5,Bypass UAC using ComputerDefaults (PowerShell)
1010
defense-evasion,T1088,6,Bypass UAC by Mocking Trusted Directories
1111
defense-evasion,T1191,1,CMSTP Executing Remote Scriptlet
1212
defense-evasion,T1191,2,CMSTP Executing UAC Bypass
13-
defense-evasion,T1500,1,Compile After Delivery using csc.exe
1413
defense-evasion,T1223,1,Compiled HTML Help Local Payload
1514
defense-evasion,T1223,2,Compiled HTML Help Remote Payload
1615
defense-evasion,T1090,2,portproxy reg key
@@ -90,7 +89,6 @@ defense-evasion,T1126,2,Remove Network Share
9089
defense-evasion,T1126,3,Remove Network Share PowerShell
9190
defense-evasion,T1027,2,Execute base64-encoded PowerShell
9291
defense-evasion,T1027,3,Execute base64-encoded PowerShell from Windows Registry
93-
defense-evasion,T1502,1,Parent PID Spoofing using PowerShell
9492
defense-evasion,T1093,1,Process Hollowing using PowerShell
9593
defense-evasion,T1055,1,Process Injection via mavinject.exe
9694
defense-evasion,T1055,4,Process Injection via C#
@@ -147,8 +145,6 @@ privilege-escalation,T1183,1,IFEO Add Debugger
147145
privilege-escalation,T1183,2,IFEO Global Flags
148146
privilege-escalation,T1050,1,Service Installation CMD
149147
privilege-escalation,T1050,2,Service Installation PowerShell
150-
privilege-escalation,T1502,1,Parent PID Spoofing using PowerShell
151-
privilege-escalation,T1504,1,Append malicious start-process cmdlet
152148
privilege-escalation,T1055,1,Process Injection via mavinject.exe
153149
privilege-escalation,T1055,4,Process Injection via C#
154150
privilege-escalation,T1055,5,svchost writing a file to a UNC path
@@ -193,7 +189,6 @@ persistence,T1128,1,Netsh Helper DLL Registration
193189
persistence,T1050,1,Service Installation CMD
194190
persistence,T1050,2,Service Installation PowerShell
195191
persistence,T1137,1,DDEAUTO
196-
persistence,T1504,1,Append malicious start-process cmdlet
197192
persistence,T1060,1,Reg Key Run
198193
persistence,T1060,2,Reg Key RunOnce
199194
persistence,T1060,3,PowerShell Registry RunOnce
@@ -203,7 +198,6 @@ persistence,T1053,3,Scheduled task Remote
203198
persistence,T1053,4,Powershell Cmdlet Scheduled Task
204199
persistence,T1180,1,Set Arbitrary Binary as Screensaver
205200
persistence,T1101,1,Modify SSP configuration in registry
206-
persistence,T1505,1,Install MS Exchange Transport Agent Persistence
207201
persistence,T1058,1,Service Registry Permissions Weakness
208202
persistence,T1023,1,Shortcut Modification
209203
persistence,T1023,2,Create shortcut to cmd in startup folders
@@ -212,28 +206,13 @@ persistence,T1084,1,Persistence via WMI Event Subscription
212206
persistence,T1004,1,Winlogon Shell Key Persistence - PowerShell
213207
persistence,T1004,2,Winlogon Userinit Key Persistence - PowerShell
214208
persistence,T1004,3,Winlogon Notify Key Logon Persistence - PowerShell
215-
impact,T1485,1,Windows - Overwrite file with Sysinternals SDelete
216-
impact,T1490,1,Windows - Delete Volume Shadow Copies
217-
impact,T1490,2,Windows - Delete Volume Shadow Copies via WMI
218-
impact,T1490,3,Windows - Delete Windows Backup Catalog
219-
impact,T1490,4,Windows - Disable Windows Recovery Console Repair
220-
impact,T1490,5,Windows - Delete Volume Shadow Copies via WMI with PowerShell
221-
impact,T1490,6,Windows - Delete Backup Files
222-
impact,T1489,1,Windows - Stop service using Service Controller
223-
impact,T1489,2,Windows - Stop service using net.exe
224-
impact,T1489,3,Windows - Stop service by killing process
225-
impact,T1529,1,Shutdown System - Windows
226-
impact,T1529,2,Restart System - Windows
227209
discovery,T1087,8,Enumerate all accounts
228210
discovery,T1087,9,Enumerate all accounts via PowerShell
229211
discovery,T1087,10,Enumerate logged on users
230212
discovery,T1087,11,Enumerate logged on users via PowerShell
231213
discovery,T1010,1,List Process Main Windows - C# .NET
232214
discovery,T1217,4,List Google Chrome Bookmarks on Windows with powershell
233215
discovery,T1217,5,List Google Chrome Bookmarks on Windows with command prompt
234-
discovery,T1482,1,Windows - Discover domain trusts with dsquery
235-
discovery,T1482,2,Windows - Discover domain trusts with nltest
236-
discovery,T1482,3,Powershell enumerate domains and forests
237216
discovery,T1083,1,File and Directory Discovery (cmd.exe)
238217
discovery,T1083,2,File and Directory Discovery (PowerShell)
239218
discovery,T1135,2,Network Share Discovery command prompt
@@ -258,8 +237,6 @@ discovery,T1063,1,Security Software Discovery
258237
discovery,T1063,2,Security Software Discovery - powershell
259238
discovery,T1063,4,Security Software Discovery - Sysmon Service
260239
discovery,T1063,5,Security Software Discovery - AV Discovery via WMI
261-
discovery,T1518,1,Find and Display Internet Explorer Browser Version
262-
discovery,T1518,2,Applications Installed
263240
discovery,T1082,1,System Information Discovery
264241
discovery,T1082,6,Hostname Discovery (Windows)
265242
discovery,T1082,8,Windows MachineGUID Discovery

metadata/local.meta

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,4 +61,4 @@ access = read : [ * ]
6161
export = none
6262
owner = admin
6363
version = 8.0.1
64-
modtime = 1587039526.751615000
64+
modtime = 1587043563.477440000

0 commit comments

Comments
 (0)