From 59e7d3322bdd8e4563fabb71a3b83d839b8fbecb Mon Sep 17 00:00:00 2001 From: CircleCI Atomic Red Team doc generator Date: Fri, 28 Feb 2020 21:57:52 +0000 Subject: [PATCH] Generate docs from job=validate_atomics_generate_docs branch=master --- atomics/T1204/T1204.md | 6 ++---- atomics/index.yaml | 9 ++------- 2 files changed, 4 insertions(+), 11 deletions(-) diff --git a/atomics/T1204/T1204.md b/atomics/T1204/T1204.md index ddfd1eef..944a316a 100644 --- a/atomics/T1204/T1204.md +++ b/atomics/T1204/T1204.md @@ -27,10 +27,8 @@ References: #### Inputs: | Name | Description | Type | Default Value | |------|-------------|------|---------------| -| ms_office_version | Microsoft Office version number found in "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office" default is 16.0 - | String | 16.0| -| ms_product | "Word" or "Excel" default is Word - | String | Word| +| ms_office_version | Microsoft Office version number found in "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office" | String | 16.0| +| ms_product | Maldoc application Word or Excel | String | Word| | jse_path | Path for the macro to write out the "malicious" .jse file | String | C:\Users\Public\art.jse| diff --git a/atomics/index.yaml b/atomics/index.yaml index 2eb5b25d..adaf0243 100644 --- a/atomics/index.yaml +++ b/atomics/index.yaml @@ -23770,16 +23770,11 @@ execution: - windows input_arguments: ms_office_version: - description: 'Microsoft Office version number found in "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office" - default is 16.0 - -' + description: Microsoft Office version number found in "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office" type: String default: '16.0' ms_product: - description: '"Word" or "Excel" default is Word - -' + description: Maldoc application Word or Excel type: String default: Word jse_path: