From f82a189443cd436c8a6f46c9561ff13dcddf0df8 Mon Sep 17 00:00:00 2001 From: Bhavin Patel Date: Thu, 5 Jan 2023 12:15:47 -0800 Subject: [PATCH] Update T1610.yaml remove guid --- atomics/T1610/T1610.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/atomics/T1610/T1610.yaml b/atomics/T1610/T1610.yaml index 8bd60245..a3e92ff0 100644 --- a/atomics/T1610/T1610.yaml +++ b/atomics/T1610/T1610.yaml @@ -4,7 +4,6 @@ display_name: "Deploy a container" atomic_tests: - name: Deploy Docker container - auto_generated_guid: description: | Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime. They can do this using docker create and docker start commands. Kinsing & Doki was exploited using this technique.