From 43f9dfd8123736b3b57e2f987608e98d6f5eed1c Mon Sep 17 00:00:00 2001 From: Atomic Red Team GUID generator Date: Thu, 27 Apr 2023 14:23:24 +0000 Subject: [PATCH] Generate GUIDs from job=generate-docs branch=master [skip ci] --- atomics/T1204.003/T1204.003.yaml | 1 + atomics/used_guids.txt | 1 + 2 files changed, 2 insertions(+) diff --git a/atomics/T1204.003/T1204.003.yaml b/atomics/T1204.003/T1204.003.yaml index 03f9c840..abff148b 100644 --- a/atomics/T1204.003/T1204.003.yaml +++ b/atomics/T1204.003/T1204.003.yaml @@ -2,6 +2,7 @@ attack_technique: T1204.003 display_name: "User Execution: Malicious Image" atomic_tests: - name: Malicious Execution from Mounted ISO Image + auto_generated_guid: e9795c8d-42aa-4ed4-ad80-551ed793d006 description: Adversaries may rely on a user running a malicious image to facilitate execution supported_platforms: - windows diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 1b0a6bae..0aa0f283 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1308,3 +1308,4 @@ fca246a8-a585-4f28-a2df-6495973976a1 d2b95631-62d7-45a3-aaef-0972cea97931 3d2cd093-ee05-41bd-a802-59ee5c301b85 eb121494-82d1-4148-9e2b-e624e03fbf3d +e9795c8d-42aa-4ed4-ad80-551ed793d006