diff --git a/atomics/T1098/T1098.yaml b/atomics/T1098/T1098.yaml index b615e766..5483e390 100644 --- a/atomics/T1098/T1098.yaml +++ b/atomics/T1098/T1098.yaml @@ -129,6 +129,7 @@ atomic_tests: name: sh - name: Azure - adding user to Azure AD role + auto_generated_guid: 0e65ae27-5385-46b4-98ac-607a8ee82261 description: | The adversarie want to add user to some Azure AD role. Threat actor may be interested primarily in highly privileged roles, e.g. Global Administrator, Application Administrator, @@ -194,6 +195,7 @@ atomic_tests: elevation_required: false - name: Azure - adding service principal to Azure AD role + auto_generated_guid: 92c40b3f-c406-4d1f-8d2b-c039bf5009e4 description: | The adversarie want to add service principal to some Azure AD role. Threat actor may be interested primarily in highly privileged roles, e.g. Global Administrator, Application Administrator, @@ -259,6 +261,7 @@ atomic_tests: elevation_required: false - name: Azure - adding user to Azure role in subscription + auto_generated_guid: 1a94b3fc-b080-450a-b3d8-6d9b57b472ea description: | The adversarie want to add user to some Azure role, also called Azure resource role. Threat actor may be interested primarily in highly privileged roles, e.g. Owner, Contributor. @@ -336,6 +339,7 @@ atomic_tests: elevation_required: false - name: Azure - adding service principal to Azure role in subscription + auto_generated_guid: c8f4bc29-a151-48da-b3be-4680af56f404 description: | The adversarie want to add service principal to some Azure role, also called Azure resource role. Threat actor may be interested primarily in highly privileged roles, e.g. Owner, Contributor. diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index f27565b5..cea9bd90 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -851,3 +851,7 @@ deecd55f-afe0-4a62-9fba-4d1ba2deb321 d239772b-88e2-4a2e-8473-897503401bcc eb8da98a-2e16-4551-b3dd-83de49baa14c ef0581fd-528e-4662-87bc-4c2affb86940 +0e65ae27-5385-46b4-98ac-607a8ee82261 +92c40b3f-c406-4d1f-8d2b-c039bf5009e4 +1a94b3fc-b080-450a-b3d8-6d9b57b472ea +c8f4bc29-a151-48da-b3be-4680af56f404