* Update T1041.yaml DNS-Based C2 Data Exfiltration
Simulates an adversary using DNS tunneling to exfiltrate data over a Command and Control (C2) channel.
* Update T1041.yaml
updated the changes as requested
---------
Co-authored-by: Hare Sudhan <code@0x6c.dev>
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
* fix: Updating atomics YAML file structure to align with the new JSON schema definition.
This also fixes some white space issues and general line formatting across all impacted atomics.
* fix: One additional change needed
---------
Co-authored-by: MSAdministrator <MSAdministrator@users.noreply.github.com>
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
* Modify T1041.yaml
Adding cleanup command and prereq command to Base command
* Update T1041.yaml
Modified a bit to only create the file if it doesn't already exist and choosing not to delete since it is only one small file being added to the temp directory without any sensitive information in it.
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
* Updated format of input_argument types for Url
* Updated type for input_arguments to Url (missed)
* Updating Path type for input_arguments
* Updated String type for input_arguments
* Missed a few Strings and Url types
* Updated default values for input_arguments to align with their types
* Updated Integer type for input_arguments
* Updated formatting and spacing of atomics