add csv index by OS, then by tactic and technique, add art_layer json per OS (#903)
* add csv index by OS, then by tactic and technique * generate art layer for each OS * generate art layer for each OS * update readme * reset files * a little cleanup * a little cleanup * deleted files from old location * new folder structure and naming * link fix * temp add
This commit is contained in:
@@ -40,11 +40,11 @@ Join the community on Slack at [https://atomicredteam.slack.com](https://atomicr
|
||||
|
||||
* [Getting Started With Atomic Tests](https://atomicredteam.io/testing)
|
||||
* Automated Test Execution with the [Execution Frameworks](https://github.com/redcanaryco/atomic-red-team/blob/master/execution-frameworks)
|
||||
* Peruse the [Complete list of Atomic Tests](atomics/index.md) and the [ATT&CK Matrix](atomics/matrix.md)
|
||||
- Windows [Tests](atomics/windows-index.md) and [Matrix](atomics/windows-matrix.md)
|
||||
- macOS [Tests](atomics/macos-index.md) and [Matrix](atomics/macos-matrix.md)
|
||||
- Linux [Tests](atomics/linux-index.md) and [Matrix](atomics/linux-matrix.md)
|
||||
* Using [ATT&CK Navigator](https://github.com/mitre-attack/attack-navigator)? Check out our [coverage layer](atomics/art_navigator_layer.json)
|
||||
* Peruse the Complete list of Atomic Tests ([md](atomics/Indexes-Markdown/index.md), [csv](atomics/Indexes-CSV/index-by-tactic.md)) and the [ATT&CK Matrix](atomics/Matrices/matrix.md)
|
||||
- Windows [Matrix](atomics/Matrices/windows-matrix.md) and tests by tactic ([md](atomics/Indexes-Markdown/windows-index.md), [csv](atomics/Indexes-CSV/windows-index.csv))
|
||||
- MacOS [Matrix](atomics/Matrices/macos-matrix.md) and tests by tactic ([md](atomics/Indexes-Markdown/macos-index.md), [csv](atomics/Indexes-CSV/macos-index.csv))
|
||||
- Linux [Matrix](atomics/Matrices/linux-matrix.md) and tests by tactic ([md](atomics/Indexes-Markdown/linux-index.md), [csv](atomics/Indexes-CSV/linux-index.csv))
|
||||
* Using [ATT&CK Navigator](https://github.com/mitre-attack/attack-navigator)? Check out our coverage layers ([All](atomics/Attack-Navigator-Layers/art-navigator-layer.json), [Windows](atomics/Attack-Navigator-Layers/art-navigator-layer-windows.json), [MacOS](atomics/Attack-Navigator-Layers/art-navigator-layer-macos.json), [Linux](atomics/Attack-Navigator-Layers/art-navigator-layer-linux.json))
|
||||
* [Fork](https://github.com/redcanaryco/atomic-red-team/fork) and [Contribute](https://atomicredteam.io/contributing) your own modifications
|
||||
* Have questions? Join the community on Slack at [https://atomicredteam.slack.com](https://atomicredteam.slack.com)
|
||||
* Need a Slack invitation? Grab one at [https://slack.atomicredteam.io/](https://slack.atomicredteam.io/)
|
||||
|
||||
@@ -0,0 +1 @@
|
||||
{"version":"2.2","name":"Atomic Red Team","description":"Atomic Red Team MITRE ATT&CK Navigator Layer","domain":"mitre-enterprise","gradient":{"colors":["#ce232e","#ce232e"],"minValue":0,"maxValue":100},"legendItems":[{"label":"Has at least one test","color":"#ce232e"}],"techniques":[{"techniqueID":"T1002","score":100,"enabled":true},{"techniqueID":"T1009","score":100,"enabled":true},{"techniqueID":"T1014","score":100,"enabled":true},{"techniqueID":"T1016","score":100,"enabled":true},{"techniqueID":"T1018","score":100,"enabled":true},{"techniqueID":"T1022","score":100,"enabled":true},{"techniqueID":"T1027","score":100,"enabled":true},{"techniqueID":"T1030","score":100,"enabled":true},{"techniqueID":"T1033","score":100,"enabled":true},{"techniqueID":"T1036","score":100,"enabled":true},{"techniqueID":"T1040","score":100,"enabled":true},{"techniqueID":"T1046","score":100,"enabled":true},{"techniqueID":"T1048","score":100,"enabled":true},{"techniqueID":"T1049","score":100,"enabled":true},{"techniqueID":"T1055","score":100,"enabled":true},{"techniqueID":"T1057","score":100,"enabled":true},{"techniqueID":"T1059","score":100,"enabled":true},{"techniqueID":"T1063","score":100,"enabled":true},{"techniqueID":"T1064","score":100,"enabled":true},{"techniqueID":"T1065","score":100,"enabled":true},{"techniqueID":"T1069","score":100,"enabled":true},{"techniqueID":"T1070","score":100,"enabled":true},{"techniqueID":"T1071","score":100,"enabled":true},{"techniqueID":"T1074","score":100,"enabled":true},{"techniqueID":"T1081","score":100,"enabled":true},{"techniqueID":"T1082","score":100,"enabled":true},{"techniqueID":"T1083","score":100,"enabled":true},{"techniqueID":"T1087","score":100,"enabled":true},{"techniqueID":"T1089","score":100,"enabled":true},{"techniqueID":"T1090","score":100,"enabled":true},{"techniqueID":"T1099","score":100,"enabled":true},{"techniqueID":"T1105","score":100,"enabled":true},{"techniqueID":"T1107","score":100,"enabled":true},{"techniqueID":"T1113","score":100,"enabled":true},{"techniqueID":"T1130","score":100,"enabled":true},{"techniqueID":"T1132","score":100,"enabled":true},{"techniqueID":"T1135","score":100,"enabled":true},{"techniqueID":"T1136","score":100,"enabled":true},{"techniqueID":"T1139","score":100,"enabled":true},{"techniqueID":"T1145","score":100,"enabled":true},{"techniqueID":"T1146","score":100,"enabled":true},{"techniqueID":"T1148","score":100,"enabled":true},{"techniqueID":"T1153","score":100,"enabled":true},{"techniqueID":"T1154","score":100,"enabled":true},{"techniqueID":"T1156","score":100,"enabled":true},{"techniqueID":"T1158","score":100,"enabled":true},{"techniqueID":"T1166","score":100,"enabled":true},{"techniqueID":"T1168","score":100,"enabled":true},{"techniqueID":"T1169","score":100,"enabled":true},{"techniqueID":"T1176","score":100,"enabled":true},{"techniqueID":"T1201","score":100,"enabled":true},{"techniqueID":"T1206","score":100,"enabled":true},{"techniqueID":"T1215","score":100,"enabled":true},{"techniqueID":"T1217","score":100,"enabled":true},{"techniqueID":"T1222","score":100,"enabled":true},{"techniqueID":"T1485","score":100,"enabled":true},{"techniqueID":"T1496","score":100,"enabled":true},{"techniqueID":"T1501","score":100,"enabled":true},{"techniqueID":"T1529","score":100,"enabled":true}]}
|
||||
@@ -0,0 +1 @@
|
||||
{"version":"2.2","name":"Atomic Red Team","description":"Atomic Red Team MITRE ATT&CK Navigator Layer","domain":"mitre-enterprise","gradient":{"colors":["#ce232e","#ce232e"],"minValue":0,"maxValue":100},"legendItems":[{"label":"Has at least one test","color":"#ce232e"}],"techniques":[{"techniqueID":"T1002","score":100,"enabled":true},{"techniqueID":"T1005","score":100,"enabled":true},{"techniqueID":"T1009","score":100,"enabled":true},{"techniqueID":"T1016","score":100,"enabled":true},{"techniqueID":"T1018","score":100,"enabled":true},{"techniqueID":"T1022","score":100,"enabled":true},{"techniqueID":"T1027","score":100,"enabled":true},{"techniqueID":"T1030","score":100,"enabled":true},{"techniqueID":"T1033","score":100,"enabled":true},{"techniqueID":"T1037","score":100,"enabled":true},{"techniqueID":"T1040","score":100,"enabled":true},{"techniqueID":"T1046","score":100,"enabled":true},{"techniqueID":"T1048","score":100,"enabled":true},{"techniqueID":"T1049","score":100,"enabled":true},{"techniqueID":"T1057","score":100,"enabled":true},{"techniqueID":"T1059","score":100,"enabled":true},{"techniqueID":"T1063","score":100,"enabled":true},{"techniqueID":"T1064","score":100,"enabled":true},{"techniqueID":"T1065","score":100,"enabled":true},{"techniqueID":"T1069","score":100,"enabled":true},{"techniqueID":"T1070","score":100,"enabled":true},{"techniqueID":"T1071","score":100,"enabled":true},{"techniqueID":"T1074","score":100,"enabled":true},{"techniqueID":"T1081","score":100,"enabled":true},{"techniqueID":"T1082","score":100,"enabled":true},{"techniqueID":"T1083","score":100,"enabled":true},{"techniqueID":"T1087","score":100,"enabled":true},{"techniqueID":"T1089","score":100,"enabled":true},{"techniqueID":"T1090","score":100,"enabled":true},{"techniqueID":"T1099","score":100,"enabled":true},{"techniqueID":"T1105","score":100,"enabled":true},{"techniqueID":"T1107","score":100,"enabled":true},{"techniqueID":"T1113","score":100,"enabled":true},{"techniqueID":"T1132","score":100,"enabled":true},{"techniqueID":"T1135","score":100,"enabled":true},{"techniqueID":"T1136","score":100,"enabled":true},{"techniqueID":"T1139","score":100,"enabled":true},{"techniqueID":"T1141","score":100,"enabled":true},{"techniqueID":"T1142","score":100,"enabled":true},{"techniqueID":"T1144","score":100,"enabled":true},{"techniqueID":"T1145","score":100,"enabled":true},{"techniqueID":"T1146","score":100,"enabled":true},{"techniqueID":"T1147","score":100,"enabled":true},{"techniqueID":"T1148","score":100,"enabled":true},{"techniqueID":"T1150","score":100,"enabled":true},{"techniqueID":"T1151","score":100,"enabled":true},{"techniqueID":"T1152","score":100,"enabled":true},{"techniqueID":"T1153","score":100,"enabled":true},{"techniqueID":"T1154","score":100,"enabled":true},{"techniqueID":"T1155","score":100,"enabled":true},{"techniqueID":"T1156","score":100,"enabled":true},{"techniqueID":"T1158","score":100,"enabled":true},{"techniqueID":"T1159","score":100,"enabled":true},{"techniqueID":"T1160","score":100,"enabled":true},{"techniqueID":"T1163","score":100,"enabled":true},{"techniqueID":"T1164","score":100,"enabled":true},{"techniqueID":"T1165","score":100,"enabled":true},{"techniqueID":"T1166","score":100,"enabled":true},{"techniqueID":"T1168","score":100,"enabled":true},{"techniqueID":"T1169","score":100,"enabled":true},{"techniqueID":"T1176","score":100,"enabled":true},{"techniqueID":"T1201","score":100,"enabled":true},{"techniqueID":"T1206","score":100,"enabled":true},{"techniqueID":"T1217","score":100,"enabled":true},{"techniqueID":"T1222","score":100,"enabled":true},{"techniqueID":"T1485","score":100,"enabled":true},{"techniqueID":"T1496","score":100,"enabled":true},{"techniqueID":"T1519","score":100,"enabled":true},{"techniqueID":"T1529","score":100,"enabled":true}]}
|
||||
File diff suppressed because one or more lines are too long
@@ -0,0 +1,655 @@
|
||||
Tactic,Technique #,Test #,Test Name
|
||||
persistence,T1156,1,Add command to .bash_profile
|
||||
persistence,T1156,2,Add command to .bashrc
|
||||
persistence,T1015,1,Attaches Command Prompt as a Debugger to a List of Target Processes
|
||||
persistence,T1098,1,Admin Account Manipulate
|
||||
persistence,T1103,1,Install AppInit Shim
|
||||
persistence,T1138,1,Application Shim Installation
|
||||
persistence,T1138,2,New shim database files created in the default shim database directory
|
||||
persistence,T1138,3,Registry key creation and/or modification events for SDB
|
||||
persistence,T1197,1,Bitsadmin Download (cmd)
|
||||
persistence,T1197,2,Bitsadmin Download (PowerShell)
|
||||
persistence,T1197,3,"Persist, Download, & Execute"
|
||||
persistence,T1176,1,Chrome (Developer Mode)
|
||||
persistence,T1176,2,Chrome (Chrome Web Store)
|
||||
persistence,T1176,3,Firefox
|
||||
persistence,T1042,1,Change Default File Association
|
||||
persistence,T1136,1,Create a user account on a Linux system
|
||||
persistence,T1136,2,Create a user account on a MacOS system
|
||||
persistence,T1136,3,Create a new user in a command prompt
|
||||
persistence,T1136,4,Create a new user in PowerShell
|
||||
persistence,T1136,5,Create a new user in Linux with `root` UID and GID.
|
||||
persistence,T1038,1,DLL Search Order Hijacking - amsi.dll
|
||||
persistence,T1519,1,Persistance with Event Monitor - emond
|
||||
persistence,T1044,1,File System Permissions Weakness
|
||||
persistence,T1158,1,Create a hidden file in a hidden directory
|
||||
persistence,T1158,2,Mac Hidden file
|
||||
persistence,T1158,3,Create Windows System File with Attrib
|
||||
persistence,T1158,4,Create Windows Hidden File with Attrib
|
||||
persistence,T1158,5,Hidden files
|
||||
persistence,T1158,6,Hide a Directory
|
||||
persistence,T1158,7,Show all hidden files
|
||||
persistence,T1158,8,Create ADS command prompt
|
||||
persistence,T1158,9,Create ADS PowerShell
|
||||
persistence,T1179,1,Hook PowerShell TLS Encrypt/Decrypt Messages
|
||||
persistence,T1062,1,Installing Hyper-V Feature
|
||||
persistence,T1183,1,IFEO Add Debugger
|
||||
persistence,T1183,2,IFEO Global Flags
|
||||
persistence,T1215,1,Linux - Load Kernel Module via insmod
|
||||
persistence,T1159,1,Launch Agent
|
||||
persistence,T1160,1,Launch Daemon
|
||||
persistence,T1152,1,Launchctl
|
||||
persistence,T1168,1,Cron - Replace crontab with referenced file
|
||||
persistence,T1168,2,Cron - Add script to cron folder
|
||||
persistence,T1168,3,Event Monitor Daemon Persistence
|
||||
persistence,T1037,1,Logon Scripts
|
||||
persistence,T1037,2,Scheduled Task Startup Script
|
||||
persistence,T1037,3,Logon Scripts - Mac
|
||||
persistence,T1037,4,Supicious vbs file run from startup Folder
|
||||
persistence,T1037,5,Supicious jse file run from startup Folder
|
||||
persistence,T1037,6,Supicious bat file run from startup Folder
|
||||
persistence,T1031,1,Modify Fax service to run PowerShell
|
||||
persistence,T1128,1,Netsh Helper DLL Registration
|
||||
persistence,T1050,1,Service Installation
|
||||
persistence,T1050,2,Service Installation PowerShell
|
||||
persistence,T1137,1,DDEAUTO
|
||||
persistence,T1150,1,Plist Modification
|
||||
persistence,T1504,1,Append malicious start-process cmdlet
|
||||
persistence,T1163,1,rc.common
|
||||
persistence,T1164,1,Re-Opened Applications
|
||||
persistence,T1164,2,Re-Opened Applications
|
||||
persistence,T1060,1,Reg Key Run
|
||||
persistence,T1060,2,Reg Key RunOnce
|
||||
persistence,T1060,3,PowerShell Registry RunOnce
|
||||
persistence,T1053,1,At.exe Scheduled task
|
||||
persistence,T1053,2,Scheduled task Local
|
||||
persistence,T1053,3,Scheduled task Remote
|
||||
persistence,T1053,4,Powershell Cmdlet Scheduled Task
|
||||
persistence,T1180,1,Set Arbitrary Binary as Screensaver
|
||||
persistence,T1101,1,Modify SSP configuration in registry
|
||||
persistence,T1505,1,Install MS Exchange Transport Agent Persistence
|
||||
persistence,T1058,1,Service Registry Permissions Weakness
|
||||
persistence,T1166,1,Make and modify binary from C source
|
||||
persistence,T1166,2,Set a SetUID flag on file
|
||||
persistence,T1166,3,Set a SetGID flag on file
|
||||
persistence,T1023,1,Shortcut Modification
|
||||
persistence,T1023,2,Create shortcut to cmd in startup folders
|
||||
persistence,T1165,1,add file to Local Library StartupItems
|
||||
persistence,T1501,1,Create Systemd Service
|
||||
persistence,T1154,1,Trap
|
||||
persistence,T1100,1,Web Shell Written to Disk
|
||||
persistence,T1084,1,Persistence
|
||||
persistence,T1004,1,Winlogon Shell Key Persistence - PowerShell
|
||||
persistence,T1004,2,Winlogon Userinit Key Persistence - PowerShell
|
||||
persistence,T1004,3,Winlogon Notify Key Logon Persistence - PowerShell
|
||||
defense-evasion,T1197,1,Bitsadmin Download (cmd)
|
||||
defense-evasion,T1197,2,Bitsadmin Download (PowerShell)
|
||||
defense-evasion,T1197,3,"Persist, Download, & Execute"
|
||||
defense-evasion,T1009,1,Pad Binary to Change Hash - Linux/macOS dd
|
||||
defense-evasion,T1088,1,Bypass UAC using Event Viewer (cmd)
|
||||
defense-evasion,T1088,2,Bypass UAC using Event Viewer (PowerShell)
|
||||
defense-evasion,T1088,3,Bypass UAC using Fodhelper
|
||||
defense-evasion,T1088,4,Bypass UAC using Fodhelper - PowerShell
|
||||
defense-evasion,T1088,5,Bypass UAC using ComputerDefaults (PowerShell)
|
||||
defense-evasion,T1088,6,Bypass UAC by Mocking Trusted Directories
|
||||
defense-evasion,T1191,1,CMSTP Executing Remote Scriptlet
|
||||
defense-evasion,T1191,2,CMSTP Executing UAC Bypass
|
||||
defense-evasion,T1146,1,Clear Bash history (rm)
|
||||
defense-evasion,T1146,2,Clear Bash history (echo)
|
||||
defense-evasion,T1146,3,Clear Bash history (cat dev/null)
|
||||
defense-evasion,T1146,4,Clear Bash history (ln dev/null)
|
||||
defense-evasion,T1146,5,Clear Bash history (truncate)
|
||||
defense-evasion,T1146,6,Clear history of a bunch of shells
|
||||
defense-evasion,T1500,1,Compile After Delivery using csc.exe
|
||||
defense-evasion,T1223,1,Compiled HTML Help Local Payload
|
||||
defense-evasion,T1223,2,Compiled HTML Help Remote Payload
|
||||
defense-evasion,T1090,1,Connection Proxy
|
||||
defense-evasion,T1090,2,portproxy reg key
|
||||
defense-evasion,T1196,1,Control Panel Items
|
||||
defense-evasion,T1207,1,DCShadow - Mimikatz
|
||||
defense-evasion,T1038,1,DLL Search Order Hijacking - amsi.dll
|
||||
defense-evasion,T1073,1,DLL Side-Loading using the Notepad++ GUP.exe binary
|
||||
defense-evasion,T1140,1,Deobfuscate/Decode Files Or Information
|
||||
defense-evasion,T1140,2,Certutil Rename and Decode
|
||||
defense-evasion,T1089,1,Disable iptables firewall
|
||||
defense-evasion,T1089,2,Disable syslog
|
||||
defense-evasion,T1089,3,Disable Cb Response
|
||||
defense-evasion,T1089,4,Disable SELinux
|
||||
defense-evasion,T1089,5,Disable Carbon Black Response
|
||||
defense-evasion,T1089,6,Disable LittleSnitch
|
||||
defense-evasion,T1089,7,Disable OpenDNS Umbrella
|
||||
defense-evasion,T1089,8,Unload Sysmon Filter Driver
|
||||
defense-evasion,T1089,9,Disable Windows IIS HTTP Logging
|
||||
defense-evasion,T1089,10,Uninstall Sysmon
|
||||
defense-evasion,T1089,11,AMSI Bypass - AMSI InitFailed
|
||||
defense-evasion,T1089,12,AMSI Bypass - Remove AMSI Provider Reg Key
|
||||
defense-evasion,T1089,13,Disable Arbitrary Security Windows Service
|
||||
defense-evasion,T1089,14,Disable PowerShell Script Block Logging
|
||||
defense-evasion,T1089,15,PowerShell Bypass of AntiMalware Scripting Interface
|
||||
defense-evasion,T1089,16,Tamper with Windows Defender ATP PowerShell
|
||||
defense-evasion,T1089,17,Tamper with Windows Defender Command Prompt
|
||||
defense-evasion,T1089,18,Tamper with Windows Defender Registry
|
||||
defense-evasion,T1089,19,Disable Microft Office Security Features
|
||||
defense-evasion,T1089,20,Remove Windows Defender Definition Files
|
||||
defense-evasion,T1107,1,Delete a single file - Linux/macOS
|
||||
defense-evasion,T1107,2,Delete an entire folder - Linux/macOS
|
||||
defense-evasion,T1107,3,Overwrite and delete a file with shred
|
||||
defense-evasion,T1107,4,Delete a single file - Windows cmd
|
||||
defense-evasion,T1107,5,Delete an entire folder - Windows cmd
|
||||
defense-evasion,T1107,6,Delete a single file - Windows PowerShell
|
||||
defense-evasion,T1107,7,Delete an entire folder - Windows PowerShell
|
||||
defense-evasion,T1107,8,Delete VSS - vssadmin
|
||||
defense-evasion,T1107,9,Delete VSS - wmic
|
||||
defense-evasion,T1107,10,bcdedit
|
||||
defense-evasion,T1107,11,wbadmin
|
||||
defense-evasion,T1107,12,Delete Filesystem - Linux
|
||||
defense-evasion,T1107,13,Delete-PrefetchFile
|
||||
defense-evasion,T1107,14,Delete TeamViewer Log Files
|
||||
defense-evasion,T1222,1,Take ownership using takeown utility
|
||||
defense-evasion,T1222,2,Take ownership recursively using takeown utility
|
||||
defense-evasion,T1222,3,cacls - Grant permission to specified user or group
|
||||
defense-evasion,T1222,4,cacls - Grant permission to specified user or group recursively
|
||||
defense-evasion,T1222,5,icacls - Grant permission to specified user or group
|
||||
defense-evasion,T1222,6,icacls - Grant permission to specified user or group recursively
|
||||
defense-evasion,T1222,7,attrib - Remove read-only attribute
|
||||
defense-evasion,T1222,8,chmod - Change file or folder mode (numeric mode)
|
||||
defense-evasion,T1222,9,chmod - Change file or folder mode (symbolic mode)
|
||||
defense-evasion,T1222,10,chmod - Change file or folder mode (numeric mode) recursively
|
||||
defense-evasion,T1222,11,chmod - Change file or folder mode (symbolic mode) recursively
|
||||
defense-evasion,T1222,12,chown - Change file or folder ownership and group
|
||||
defense-evasion,T1222,13,chown - Change file or folder ownership and group recursively
|
||||
defense-evasion,T1222,14,chown - Change file or folder mode ownership only
|
||||
defense-evasion,T1222,15,chown - Change file or folder ownership recursively
|
||||
defense-evasion,T1222,16,chattr - Remove immutable file attribute
|
||||
defense-evasion,T1144,1,Gatekeeper Bypass
|
||||
defense-evasion,T1148,1,Disable history collection
|
||||
defense-evasion,T1148,2,Mac HISTCONTROL
|
||||
defense-evasion,T1158,1,Create a hidden file in a hidden directory
|
||||
defense-evasion,T1158,2,Mac Hidden file
|
||||
defense-evasion,T1158,3,Create Windows System File with Attrib
|
||||
defense-evasion,T1158,4,Create Windows Hidden File with Attrib
|
||||
defense-evasion,T1158,5,Hidden files
|
||||
defense-evasion,T1158,6,Hide a Directory
|
||||
defense-evasion,T1158,7,Show all hidden files
|
||||
defense-evasion,T1158,8,Create ADS command prompt
|
||||
defense-evasion,T1158,9,Create ADS PowerShell
|
||||
defense-evasion,T1147,1,Hidden Users
|
||||
defense-evasion,T1143,1,Hidden Window
|
||||
defense-evasion,T1183,1,IFEO Add Debugger
|
||||
defense-evasion,T1183,2,IFEO Global Flags
|
||||
defense-evasion,T1070,1,Clear Logs
|
||||
defense-evasion,T1070,2,FSUtil
|
||||
defense-evasion,T1070,3,rm -rf
|
||||
defense-evasion,T1070,4,Overwrite Linux Mail Spool
|
||||
defense-evasion,T1070,5,Overwrite Linux Log
|
||||
defense-evasion,T1070,6,Delete System Logs Using PowerShell
|
||||
defense-evasion,T1070,7,Delete System Logs Using Clear-EventLogId
|
||||
defense-evasion,T1202,1,Indirect Command Execution - pcalua.exe
|
||||
defense-evasion,T1202,2,Indirect Command Execution - forfiles.exe
|
||||
defense-evasion,T1130,1,Install root CA on CentOS/RHEL
|
||||
defense-evasion,T1118,1,CheckIfInstallable method call
|
||||
defense-evasion,T1118,2,InstallHelper method call
|
||||
defense-evasion,T1118,3,InstallUtil class constructor method call
|
||||
defense-evasion,T1118,4,InstallUtil Install method call
|
||||
defense-evasion,T1118,5,InstallUtil Uninstall method call - /U variant
|
||||
defense-evasion,T1118,6,InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant
|
||||
defense-evasion,T1118,7,InstallUtil HelpText method call
|
||||
defense-evasion,T1118,8,InstallUtil evasive invocation
|
||||
defense-evasion,T1152,1,Launchctl
|
||||
defense-evasion,T1036,1,Masquerading as Windows LSASS process
|
||||
defense-evasion,T1036,2,Masquerading as Linux crond process.
|
||||
defense-evasion,T1036,3,Masquerading - cscript.exe running as notepad.exe
|
||||
defense-evasion,T1036,4,Masquerading - wscript.exe running as svchost.exe
|
||||
defense-evasion,T1036,5,Masquerading - powershell.exe running as taskhostw.exe
|
||||
defense-evasion,T1036,6,Masquerading - non-windows exe running as windows exe
|
||||
defense-evasion,T1036,7,Masquerading - windows exe running as different windows exe
|
||||
defense-evasion,T1036,8,Malicious process Masquerading as LSM.exe
|
||||
defense-evasion,T1112,1,Modify Registry of Current User Profile - cmd
|
||||
defense-evasion,T1112,2,Modify Registry of Local Machine - cmd
|
||||
defense-evasion,T1112,3,Modify Registry of Another User Profile
|
||||
defense-evasion,T1112,4,Modify registry to store logon credentials
|
||||
defense-evasion,T1112,5,Modify registry to store PowerShell code
|
||||
defense-evasion,T1112,6,Add domain to Trusted sites Zone
|
||||
defense-evasion,T1112,7,Javascript in registry
|
||||
defense-evasion,T1170,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject
|
||||
defense-evasion,T1170,2,Mshta calls a local VBScript file to launch notepad.exe
|
||||
defense-evasion,T1170,3,Mshta executes VBScript to execute malicious command
|
||||
defense-evasion,T1170,4,Mshta Executes Remote HTML Application (HTA)
|
||||
defense-evasion,T1096,1,Alternate Data Streams (ADS)
|
||||
defense-evasion,T1096,2,Store file in Alternate Data Stream (ADS)
|
||||
defense-evasion,T1126,1,Add Network Share
|
||||
defense-evasion,T1126,2,Remove Network Share
|
||||
defense-evasion,T1126,3,Remove Network Share PowerShell
|
||||
defense-evasion,T1027,1,Decode base64 Data into Script
|
||||
defense-evasion,T1027,2,Execute base64-encoded PowerShell
|
||||
defense-evasion,T1027,3,Execute base64-encoded PowerShell from Windows Registry
|
||||
defense-evasion,T1502,1,Parent PID Spoofing using PowerShell
|
||||
defense-evasion,T1150,1,Plist Modification
|
||||
defense-evasion,T1093,1,Process Hollowing using PowerShell
|
||||
defense-evasion,T1055,1,Process Injection via mavinject.exe
|
||||
defense-evasion,T1055,2,Process Injection via PowerSploit
|
||||
defense-evasion,T1055,3,Shared Library Injection via /etc/ld.so.preload
|
||||
defense-evasion,T1055,4,Shared Library Injection via LD_PRELOAD
|
||||
defense-evasion,T1055,5,Process Injection via C#
|
||||
defense-evasion,T1055,6,svchost writing a file to a UNC path
|
||||
defense-evasion,T1121,1,Regasm Uninstall Method Call Test
|
||||
defense-evasion,T1121,2,Regsvs Uninstall Method Call Test
|
||||
defense-evasion,T1117,1,Regsvr32 local COM scriptlet execution
|
||||
defense-evasion,T1117,2,Regsvr32 remote COM scriptlet execution
|
||||
defense-evasion,T1117,3,Regsvr32 local DLL execution
|
||||
defense-evasion,T1014,1,Loadable Kernel Module based Rootkit
|
||||
defense-evasion,T1014,2,Loadable Kernel Module based Rootkit
|
||||
defense-evasion,T1014,3,Windows Signed Driver Rootkit Test
|
||||
defense-evasion,T1085,1,Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
defense-evasion,T1085,2,Rundll32 execute VBscript command
|
||||
defense-evasion,T1085,3,Rundll32 advpack.dll Execution
|
||||
defense-evasion,T1085,4,Rundll32 ieadvpack.dll Execution
|
||||
defense-evasion,T1085,5,Rundll32 syssetup.dll Execution
|
||||
defense-evasion,T1085,6,Rundll32 setupapi.dll Execution
|
||||
defense-evasion,T1064,1,Create and Execute Bash Shell Script
|
||||
defense-evasion,T1064,2,Create and Execute Batch Script
|
||||
defense-evasion,T1218,1,mavinject - Inject DLL into running process
|
||||
defense-evasion,T1218,2,SyncAppvPublishingServer - Execute arbitrary PowerShell code
|
||||
defense-evasion,T1218,3,Register-CimProvider - Execute evil dll
|
||||
defense-evasion,T1218,4,Msiexec.exe - Execute Local MSI file
|
||||
defense-evasion,T1218,5,Msiexec.exe - Execute Remote MSI file
|
||||
defense-evasion,T1218,6,Msiexec.exe - Execute Arbitrary DLL
|
||||
defense-evasion,T1218,7,Odbcconf.exe - Execute Arbitrary DLL
|
||||
defense-evasion,T1218,8,InfDefaultInstall.exe .inf Execution
|
||||
defense-evasion,T1216,1,PubPrn.vbs Signed Script Bypass
|
||||
defense-evasion,T1216,2,SyncAppvPublishingServer Signed Script PowerShell Command Execution
|
||||
defense-evasion,T1216,3,manage-bde.wsf Signed Script Command Execution
|
||||
defense-evasion,T1151,1,Space After Filename
|
||||
defense-evasion,T1099,1,Set a file's access timestamp
|
||||
defense-evasion,T1099,2,Set a file's modification timestamp
|
||||
defense-evasion,T1099,3,Set a file's creation timestamp
|
||||
defense-evasion,T1099,4,Modify file timestamps using reference file
|
||||
defense-evasion,T1099,5,Windows - Modify file creation timestamp with PowerShell
|
||||
defense-evasion,T1099,6,Windows - Modify file last modified timestamp with PowerShell
|
||||
defense-evasion,T1099,7,Windows - Modify file last access timestamp with PowerShell
|
||||
defense-evasion,T1127,1,MSBuild Bypass Using Inline Tasks
|
||||
defense-evasion,T1102,1,Reach out to C2 Pointer URLs via command_prompt
|
||||
defense-evasion,T1102,2,Reach out to C2 Pointer URLs via powershell
|
||||
defense-evasion,T1220,1,MSXSL Bypass using local files
|
||||
defense-evasion,T1220,2,MSXSL Bypass using remote files
|
||||
defense-evasion,T1220,3,WMIC bypass using local XSL file
|
||||
defense-evasion,T1220,4,WMIC bypass using remote XSL file
|
||||
privilege-escalation,T1015,1,Attaches Command Prompt as a Debugger to a List of Target Processes
|
||||
privilege-escalation,T1103,1,Install AppInit Shim
|
||||
privilege-escalation,T1138,1,Application Shim Installation
|
||||
privilege-escalation,T1138,2,New shim database files created in the default shim database directory
|
||||
privilege-escalation,T1138,3,Registry key creation and/or modification events for SDB
|
||||
privilege-escalation,T1088,1,Bypass UAC using Event Viewer (cmd)
|
||||
privilege-escalation,T1088,2,Bypass UAC using Event Viewer (PowerShell)
|
||||
privilege-escalation,T1088,3,Bypass UAC using Fodhelper
|
||||
privilege-escalation,T1088,4,Bypass UAC using Fodhelper - PowerShell
|
||||
privilege-escalation,T1088,5,Bypass UAC using ComputerDefaults (PowerShell)
|
||||
privilege-escalation,T1088,6,Bypass UAC by Mocking Trusted Directories
|
||||
privilege-escalation,T1038,1,DLL Search Order Hijacking - amsi.dll
|
||||
privilege-escalation,T1519,1,Persistance with Event Monitor - emond
|
||||
privilege-escalation,T1044,1,File System Permissions Weakness
|
||||
privilege-escalation,T1179,1,Hook PowerShell TLS Encrypt/Decrypt Messages
|
||||
privilege-escalation,T1183,1,IFEO Add Debugger
|
||||
privilege-escalation,T1183,2,IFEO Global Flags
|
||||
privilege-escalation,T1160,1,Launch Daemon
|
||||
privilege-escalation,T1050,1,Service Installation
|
||||
privilege-escalation,T1050,2,Service Installation PowerShell
|
||||
privilege-escalation,T1502,1,Parent PID Spoofing using PowerShell
|
||||
privilege-escalation,T1150,1,Plist Modification
|
||||
privilege-escalation,T1504,1,Append malicious start-process cmdlet
|
||||
privilege-escalation,T1055,1,Process Injection via mavinject.exe
|
||||
privilege-escalation,T1055,2,Process Injection via PowerSploit
|
||||
privilege-escalation,T1055,3,Shared Library Injection via /etc/ld.so.preload
|
||||
privilege-escalation,T1055,4,Shared Library Injection via LD_PRELOAD
|
||||
privilege-escalation,T1055,5,Process Injection via C#
|
||||
privilege-escalation,T1055,6,svchost writing a file to a UNC path
|
||||
privilege-escalation,T1053,1,At.exe Scheduled task
|
||||
privilege-escalation,T1053,2,Scheduled task Local
|
||||
privilege-escalation,T1053,3,Scheduled task Remote
|
||||
privilege-escalation,T1053,4,Powershell Cmdlet Scheduled Task
|
||||
privilege-escalation,T1058,1,Service Registry Permissions Weakness
|
||||
privilege-escalation,T1166,1,Make and modify binary from C source
|
||||
privilege-escalation,T1166,2,Set a SetUID flag on file
|
||||
privilege-escalation,T1166,3,Set a SetGID flag on file
|
||||
privilege-escalation,T1165,1,add file to Local Library StartupItems
|
||||
privilege-escalation,T1169,1,Sudo usage
|
||||
privilege-escalation,T1206,1,Unlimited sudo cache timeout
|
||||
privilege-escalation,T1206,2,Disable tty_tickets for sudo caching
|
||||
privilege-escalation,T1100,1,Web Shell Written to Disk
|
||||
impact,T1531,1,Change User Password - Windows
|
||||
impact,T1531,2,Delete User - Windows
|
||||
impact,T1485,1,Windows - Delete Volume Shadow Copies
|
||||
impact,T1485,2,Windows - Delete Windows Backup Catalog
|
||||
impact,T1485,3,Windows - Disable Windows Recovery Console Repair
|
||||
impact,T1485,4,Windows - Overwrite file with Sysinternals SDelete
|
||||
impact,T1485,5,macOS/Linux - Overwrite file with DD
|
||||
impact,T1485,6,Windows - Delete Backup Files
|
||||
impact,T1490,1,Windows - Delete Volume Shadow Copies
|
||||
impact,T1490,2,Windows - Delete Volume Shadow Copies via WMI
|
||||
impact,T1490,3,Windows - Delete Windows Backup Catalog
|
||||
impact,T1490,4,Windows - Disable Windows Recovery Console Repair
|
||||
impact,T1490,5,Windows - Delete Volume Shadow Copies via WMI with PowerShell
|
||||
impact,T1496,1,macOS/Linux - Simulate CPU Load with Yes
|
||||
impact,T1489,1,Windows - Stop service using Service Controller
|
||||
impact,T1489,2,Windows - Stop service using net.exe
|
||||
impact,T1489,3,Windows - Stop service by killing process
|
||||
impact,T1529,1,Shutdown System - Windows
|
||||
impact,T1529,2,Restart System - Windows
|
||||
impact,T1529,3,Restart System via `shutdown` - macOS/Linux
|
||||
impact,T1529,4,Shutdown System via `shutdown` - macOS/Linux
|
||||
impact,T1529,5,Restart System via `reboot` - macOS/Linux
|
||||
impact,T1529,6,Shutdown System via `halt` - Linux
|
||||
impact,T1529,7,Reboot System via `halt` - Linux
|
||||
impact,T1529,8,Shutdown System via `poweroff` - Linux
|
||||
impact,T1529,9,Reboot System via `poweroff` - Linux
|
||||
discovery,T1087,1,Enumerate all accounts
|
||||
discovery,T1087,2,View sudoers access
|
||||
discovery,T1087,3,View accounts with UID 0
|
||||
discovery,T1087,4,List opened files by user
|
||||
discovery,T1087,5,Show if a user account has ever logged in remotely
|
||||
discovery,T1087,6,Enumerate users and groups
|
||||
discovery,T1087,7,Enumerate users and groups
|
||||
discovery,T1087,8,Enumerate all accounts
|
||||
discovery,T1087,9,Enumerate all accounts via PowerShell
|
||||
discovery,T1087,10,Enumerate logged on users
|
||||
discovery,T1087,11,Enumerate logged on users via PowerShell
|
||||
discovery,T1010,1,List Process Main Windows - C# .NET
|
||||
discovery,T1217,1,List Mozilla Firefox Bookmark Database Files on Linux
|
||||
discovery,T1217,2,List Mozilla Firefox Bookmark Database Files on macOS
|
||||
discovery,T1217,3,List Google Chrome Bookmark JSON Files on macOS
|
||||
discovery,T1217,4,List Google Chrome Bookmarks on Windows with powershell
|
||||
discovery,T1217,5,List Google Chrome Bookmarks on Windows with command prompt
|
||||
discovery,T1482,1,Windows - Discover domain trusts with dsquery
|
||||
discovery,T1482,2,Windows - Discover domain trusts with nltest
|
||||
discovery,T1482,3,Powershell enumerate domains and forests
|
||||
discovery,T1083,1,File and Directory Discovery (cmd.exe)
|
||||
discovery,T1083,2,File and Directory Discovery (PowerShell)
|
||||
discovery,T1083,3,Nix File and Diectory Discovery
|
||||
discovery,T1083,4,Nix File and Directory Discovery 2
|
||||
discovery,T1046,1,Port Scan
|
||||
discovery,T1046,2,Port Scan Nmap
|
||||
discovery,T1135,1,Network Share Discovery
|
||||
discovery,T1135,2,Network Share Discovery command prompt
|
||||
discovery,T1135,3,Network Share Discovery PowerShell
|
||||
discovery,T1135,4,View available share drives
|
||||
discovery,T1040,1,Packet Capture Linux
|
||||
discovery,T1040,2,Packet Capture macOS
|
||||
discovery,T1040,3,Packet Capture Windows Command Prompt
|
||||
discovery,T1040,4,Packet Capture PowerShell
|
||||
discovery,T1201,1,Examine password complexity policy - Ubuntu
|
||||
discovery,T1201,2,Examine password complexity policy - CentOS/RHEL 7.x
|
||||
discovery,T1201,3,Examine password complexity policy - CentOS/RHEL 6.x
|
||||
discovery,T1201,4,Examine password expiration policy - All Linux
|
||||
discovery,T1201,5,Examine local password policy - Windows
|
||||
discovery,T1201,6,Examine domain password policy - Windows
|
||||
discovery,T1201,7,Examine password policy - macOS
|
||||
discovery,T1069,1,Permission Groups Discovery
|
||||
discovery,T1069,2,Basic Permission Groups Discovery Windows
|
||||
discovery,T1069,3,Permission Groups Discovery PowerShell
|
||||
discovery,T1069,4,Elevated group enumeration using net group
|
||||
discovery,T1057,1,Process Discovery - ps
|
||||
discovery,T1057,2,Process Discovery - tasklist
|
||||
discovery,T1012,1,Query Registry
|
||||
discovery,T1018,1,Remote System Discovery - net
|
||||
discovery,T1018,2,Remote System Discovery - net group Domain Computers
|
||||
discovery,T1018,3,Remote System Discovery - nltest
|
||||
discovery,T1018,4,Remote System Discovery - ping sweep
|
||||
discovery,T1018,5,Remote System Discovery - arp
|
||||
discovery,T1018,6,Remote System Discovery - arp nix
|
||||
discovery,T1018,7,Remote System Discovery - sweep
|
||||
discovery,T1018,8,Remote System Discovery - nslookup
|
||||
discovery,T1063,1,Security Software Discovery
|
||||
discovery,T1063,2,Security Software Discovery - powershell
|
||||
discovery,T1063,3,Security Software Discovery - ps
|
||||
discovery,T1063,4,Security Software Discovery - Sysmon Service
|
||||
discovery,T1063,5,Security Software Discovery - AV Discovery via WMI
|
||||
discovery,T1518,1,Find and Display Internet Explorer Browser Version
|
||||
discovery,T1518,2,Applications Installed
|
||||
discovery,T1082,1,System Information Discovery
|
||||
discovery,T1082,2,System Information Discovery
|
||||
discovery,T1082,3,List OS Information
|
||||
discovery,T1082,4,Linux VM Check via Hardware
|
||||
discovery,T1082,5,Linux VM Check via Kernel Modules
|
||||
discovery,T1082,6,Hostname Discovery (Windows)
|
||||
discovery,T1082,7,Hostname Discovery
|
||||
discovery,T1082,8,Windows MachineGUID Discovery
|
||||
discovery,T1016,1,System Network Configuration Discovery
|
||||
discovery,T1016,2,List Windows Firewall Rules
|
||||
discovery,T1016,3,System Network Configuration Discovery
|
||||
discovery,T1016,4,System Network Configuration Discovery (TrickBot Style)
|
||||
discovery,T1016,5,List Open Egress Ports
|
||||
discovery,T1049,1,System Network Connections Discovery
|
||||
discovery,T1049,2,System Network Connections Discovery with PowerShell
|
||||
discovery,T1049,3,System Network Connections Discovery Linux & MacOS
|
||||
discovery,T1033,1,System Owner/User Discovery
|
||||
discovery,T1033,2,System Owner/User Discovery
|
||||
discovery,T1007,1,System Service Discovery
|
||||
discovery,T1007,2,System Service Discovery - net.exe
|
||||
discovery,T1124,1,System Time Discovery
|
||||
discovery,T1124,2,System Time Discovery - PowerShell
|
||||
credential-access,T1098,1,Admin Account Manipulate
|
||||
credential-access,T1139,1,Search Through Bash History
|
||||
credential-access,T1110,1,Brute Force Credentials
|
||||
credential-access,T1003,1,Powershell Mimikatz
|
||||
credential-access,T1003,2,Gsecdump
|
||||
credential-access,T1003,3,Windows Credential Editor
|
||||
credential-access,T1003,4,"Registry dump of SAM, creds, and secrets"
|
||||
credential-access,T1003,5,Dump LSASS.exe Memory using ProcDump
|
||||
credential-access,T1003,6,Dump LSASS.exe Memory using Windows Task Manager
|
||||
credential-access,T1003,7,Offline Credential Theft With Mimikatz
|
||||
credential-access,T1003,8,Dump Active Directory Database with NTDSUtil
|
||||
credential-access,T1003,9,Create Volume Shadow Copy with NTDS.dit
|
||||
credential-access,T1003,10,Copy NTDS.dit from Volume Shadow Copy
|
||||
credential-access,T1003,11,GPP Passwords (findstr)
|
||||
credential-access,T1003,12,GPP Passwords (Get-GPPPassword)
|
||||
credential-access,T1003,13,LSASS read with pypykatz
|
||||
credential-access,T1003,14,Registry parse with pypykatz
|
||||
credential-access,T1081,1,Extract Browser and System credentials with LaZagne
|
||||
credential-access,T1081,2,Extract passwords with grep
|
||||
credential-access,T1081,3,Extracting passwords with findstr
|
||||
credential-access,T1081,4,Access unattend.xml
|
||||
credential-access,T1214,1,Enumeration for Credentials in Registry
|
||||
credential-access,T1214,2,Enumeration for PuTTY Credentials in Registry
|
||||
credential-access,T1179,1,Hook PowerShell TLS Encrypt/Decrypt Messages
|
||||
credential-access,T1056,1,Input Capture
|
||||
credential-access,T1141,1,AppleScript - Prompt User for Password
|
||||
credential-access,T1141,2,PowerShell - Prompt User for Password
|
||||
credential-access,T1208,1,Request for service tickets
|
||||
credential-access,T1142,1,Keychain
|
||||
credential-access,T1040,1,Packet Capture Linux
|
||||
credential-access,T1040,2,Packet Capture macOS
|
||||
credential-access,T1040,3,Packet Capture Windows Command Prompt
|
||||
credential-access,T1040,4,Packet Capture PowerShell
|
||||
credential-access,T1174,1,Install and Register Password Filter DLL
|
||||
credential-access,T1145,1,Private Keys
|
||||
credential-access,T1145,2,Discover Private SSH Keys
|
||||
credential-access,T1145,3,Copy Private SSH Keys with CP
|
||||
credential-access,T1145,4,Copy Private SSH Keys with rsync
|
||||
execution,T1155,1,AppleScript
|
||||
execution,T1191,1,CMSTP Executing Remote Scriptlet
|
||||
execution,T1191,2,CMSTP Executing UAC Bypass
|
||||
execution,T1059,1,Command-Line Interface
|
||||
execution,T1223,1,Compiled HTML Help Local Payload
|
||||
execution,T1223,2,Compiled HTML Help Remote Payload
|
||||
execution,T1196,1,Control Panel Items
|
||||
execution,T1173,1,Execute Commands
|
||||
execution,T1173,2,Execute PowerShell script via Word DDE
|
||||
execution,T1118,1,CheckIfInstallable method call
|
||||
execution,T1118,2,InstallHelper method call
|
||||
execution,T1118,3,InstallUtil class constructor method call
|
||||
execution,T1118,4,InstallUtil Install method call
|
||||
execution,T1118,5,InstallUtil Uninstall method call - /U variant
|
||||
execution,T1118,6,InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant
|
||||
execution,T1118,7,InstallUtil HelpText method call
|
||||
execution,T1118,8,InstallUtil evasive invocation
|
||||
execution,T1152,1,Launchctl
|
||||
execution,T1168,1,Cron - Replace crontab with referenced file
|
||||
execution,T1168,2,Cron - Add script to cron folder
|
||||
execution,T1168,3,Event Monitor Daemon Persistence
|
||||
execution,T1170,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject
|
||||
execution,T1170,2,Mshta calls a local VBScript file to launch notepad.exe
|
||||
execution,T1170,3,Mshta executes VBScript to execute malicious command
|
||||
execution,T1170,4,Mshta Executes Remote HTML Application (HTA)
|
||||
execution,T1086,1,Mimikatz
|
||||
execution,T1086,2,BloodHound
|
||||
execution,T1086,3,Obfuscation Tests
|
||||
execution,T1086,4,Mimikatz - Cradlecraft PsSendKeys
|
||||
execution,T1086,5,Invoke-AppPathBypass
|
||||
execution,T1086,6,PowerShell Add User
|
||||
execution,T1086,7,Powershell MsXml COM object - no prompt
|
||||
execution,T1086,8,Powershell MsXml COM object - with prompt
|
||||
execution,T1086,9,Powershell XML requests
|
||||
execution,T1086,10,Powershell invoke mshta.exe download
|
||||
execution,T1086,11,Powershell Invoke-DownloadCradle
|
||||
execution,T1086,12,PowerShell Fileless Script Execution
|
||||
execution,T1086,13,PowerShell Downgrade Attack
|
||||
execution,T1086,14,NTFS Alternate Data Stream Access
|
||||
execution,T1121,1,Regasm Uninstall Method Call Test
|
||||
execution,T1121,2,Regsvs Uninstall Method Call Test
|
||||
execution,T1117,1,Regsvr32 local COM scriptlet execution
|
||||
execution,T1117,2,Regsvr32 remote COM scriptlet execution
|
||||
execution,T1117,3,Regsvr32 local DLL execution
|
||||
execution,T1085,1,Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
execution,T1085,2,Rundll32 execute VBscript command
|
||||
execution,T1085,3,Rundll32 advpack.dll Execution
|
||||
execution,T1085,4,Rundll32 ieadvpack.dll Execution
|
||||
execution,T1085,5,Rundll32 syssetup.dll Execution
|
||||
execution,T1085,6,Rundll32 setupapi.dll Execution
|
||||
execution,T1053,1,At.exe Scheduled task
|
||||
execution,T1053,2,Scheduled task Local
|
||||
execution,T1053,3,Scheduled task Remote
|
||||
execution,T1053,4,Powershell Cmdlet Scheduled Task
|
||||
execution,T1064,1,Create and Execute Bash Shell Script
|
||||
execution,T1064,2,Create and Execute Batch Script
|
||||
execution,T1035,1,Execute a Command as a Service
|
||||
execution,T1035,2,Use PsExec to execute a command on a remote host
|
||||
execution,T1218,1,mavinject - Inject DLL into running process
|
||||
execution,T1218,2,SyncAppvPublishingServer - Execute arbitrary PowerShell code
|
||||
execution,T1218,3,Register-CimProvider - Execute evil dll
|
||||
execution,T1218,4,Msiexec.exe - Execute Local MSI file
|
||||
execution,T1218,5,Msiexec.exe - Execute Remote MSI file
|
||||
execution,T1218,6,Msiexec.exe - Execute Arbitrary DLL
|
||||
execution,T1218,7,Odbcconf.exe - Execute Arbitrary DLL
|
||||
execution,T1218,8,InfDefaultInstall.exe .inf Execution
|
||||
execution,T1216,1,PubPrn.vbs Signed Script Bypass
|
||||
execution,T1216,2,SyncAppvPublishingServer Signed Script PowerShell Command Execution
|
||||
execution,T1216,3,manage-bde.wsf Signed Script Command Execution
|
||||
execution,T1153,1,Execute Script using Source
|
||||
execution,T1153,2,Execute Script using Source Alias
|
||||
execution,T1151,1,Space After Filename
|
||||
execution,T1154,1,Trap
|
||||
execution,T1127,1,MSBuild Bypass Using Inline Tasks
|
||||
execution,T1204,1,OSTap Style Macro Execution
|
||||
execution,T1204,2,Maldoc choice flags command execution
|
||||
execution,T1204,3,OSTAP JS version
|
||||
execution,T1047,1,WMI Reconnaissance Users
|
||||
execution,T1047,2,WMI Reconnaissance Processes
|
||||
execution,T1047,3,WMI Reconnaissance Software
|
||||
execution,T1047,4,WMI Reconnaissance List Remote Services
|
||||
execution,T1047,5,WMI Execute Local Process
|
||||
execution,T1047,6,WMI Execute Remote Process
|
||||
execution,T1028,1,Enable Windows Remote Management
|
||||
execution,T1028,2,PowerShell Lateral Movement
|
||||
execution,T1028,3,WMIC Process Call Create
|
||||
execution,T1028,4,Psexec
|
||||
execution,T1028,5,Invoke-Command
|
||||
execution,T1220,1,MSXSL Bypass using local files
|
||||
execution,T1220,2,MSXSL Bypass using remote files
|
||||
execution,T1220,3,WMIC bypass using local XSL file
|
||||
execution,T1220,4,WMIC bypass using remote XSL file
|
||||
lateral-movement,T1155,1,AppleScript
|
||||
lateral-movement,T1037,1,Logon Scripts
|
||||
lateral-movement,T1037,2,Scheduled Task Startup Script
|
||||
lateral-movement,T1037,3,Logon Scripts - Mac
|
||||
lateral-movement,T1037,4,Supicious vbs file run from startup Folder
|
||||
lateral-movement,T1037,5,Supicious jse file run from startup Folder
|
||||
lateral-movement,T1037,6,Supicious bat file run from startup Folder
|
||||
lateral-movement,T1075,1,Mimikatz Pass the Hash
|
||||
lateral-movement,T1075,2,crackmapexec Pass the Hash
|
||||
lateral-movement,T1097,1,Mimikatz Kerberos Ticket Attack
|
||||
lateral-movement,T1076,1,RDP
|
||||
lateral-movement,T1076,2,RDPto-DomainController
|
||||
lateral-movement,T1105,1,rsync remote file copy (push)
|
||||
lateral-movement,T1105,2,rsync remote file copy (pull)
|
||||
lateral-movement,T1105,3,scp remote file copy (push)
|
||||
lateral-movement,T1105,4,scp remote file copy (pull)
|
||||
lateral-movement,T1105,5,sftp remote file copy (push)
|
||||
lateral-movement,T1105,6,sftp remote file copy (pull)
|
||||
lateral-movement,T1105,7,certutil download (urlcache)
|
||||
lateral-movement,T1105,8,certutil download (verifyctl)
|
||||
lateral-movement,T1105,9,Windows - BITSAdmin BITS Download
|
||||
lateral-movement,T1105,10,Windows - PowerShell Download
|
||||
lateral-movement,T1105,11,OSTAP Worming Activity
|
||||
lateral-movement,T1077,1,Map admin share
|
||||
lateral-movement,T1077,2,Map Admin Share PowerShell
|
||||
lateral-movement,T1077,3,Copy and Execute File with PsExec
|
||||
lateral-movement,T1077,4,Execute command writing output to local Admin Share
|
||||
lateral-movement,T1028,1,Enable Windows Remote Management
|
||||
lateral-movement,T1028,2,PowerShell Lateral Movement
|
||||
lateral-movement,T1028,3,WMIC Process Call Create
|
||||
lateral-movement,T1028,4,Psexec
|
||||
lateral-movement,T1028,5,Invoke-Command
|
||||
collection,T1123,1,using device audio capture commandlet
|
||||
collection,T1119,1,Automated Collection Command Prompt
|
||||
collection,T1119,2,Automated Collection PowerShell
|
||||
collection,T1119,3,Recon information for export with PowerShell
|
||||
collection,T1119,4,Recon information for export with Command Prompt
|
||||
collection,T1115,1,Utilize Clipboard to store or execute commands from
|
||||
collection,T1115,2,PowerShell
|
||||
collection,T1074,1,Stage data from Discovery.bat
|
||||
collection,T1074,2,Stage data from Discovery.sh
|
||||
collection,T1074,3,Zip a Folder with PowerShell for Staging in Temp
|
||||
collection,T1005,1,Search macOS Safari Cookies
|
||||
collection,T1114,1,T1114 Email Collection with PowerShell
|
||||
collection,T1056,1,Input Capture
|
||||
collection,T1113,1,Screencapture
|
||||
collection,T1113,2,Screencapture (silent)
|
||||
collection,T1113,3,X Windows Capture
|
||||
collection,T1113,4,Import
|
||||
exfiltration,T1002,1,Compress Data for Exfiltration With PowerShell
|
||||
exfiltration,T1002,2,Compress Data for Exfiltration With Rar
|
||||
exfiltration,T1002,3,Data Compressed - nix - zip
|
||||
exfiltration,T1002,4,Data Compressed - nix - gzip Single File
|
||||
exfiltration,T1002,5,Data Compressed - nix - tar Folder or File
|
||||
exfiltration,T1022,1,Data Encrypted with zip and gpg symmetric
|
||||
exfiltration,T1022,2,Compress Data and lock with password for Exfiltration with winrar
|
||||
exfiltration,T1022,3,Compress Data and lock with password for Exfiltration with winzip
|
||||
exfiltration,T1022,4,Compress Data and lock with password for Exfiltration with 7zip
|
||||
exfiltration,T1030,1,Data Transfer Size Limits
|
||||
exfiltration,T1048,1,Exfiltration Over Alternative Protocol - SSH
|
||||
exfiltration,T1048,2,Exfiltration Over Alternative Protocol - SSH
|
||||
exfiltration,T1048,3,Exfiltration Over Alternative Protocol - HTTP
|
||||
exfiltration,T1048,4,Exfiltration Over Alternative Protocol - ICMP
|
||||
exfiltration,T1048,5,Exfiltration Over Alternative Protocol - DNS
|
||||
command-and-control,T1090,1,Connection Proxy
|
||||
command-and-control,T1090,2,portproxy reg key
|
||||
command-and-control,T1132,1,Base64 Encoded data.
|
||||
command-and-control,T1219,1,TeamViewer Files Detected Test on Windows
|
||||
command-and-control,T1105,1,rsync remote file copy (push)
|
||||
command-and-control,T1105,2,rsync remote file copy (pull)
|
||||
command-and-control,T1105,3,scp remote file copy (push)
|
||||
command-and-control,T1105,4,scp remote file copy (pull)
|
||||
command-and-control,T1105,5,sftp remote file copy (push)
|
||||
command-and-control,T1105,6,sftp remote file copy (pull)
|
||||
command-and-control,T1105,7,certutil download (urlcache)
|
||||
command-and-control,T1105,8,certutil download (verifyctl)
|
||||
command-and-control,T1105,9,Windows - BITSAdmin BITS Download
|
||||
command-and-control,T1105,10,Windows - PowerShell Download
|
||||
command-and-control,T1105,11,OSTAP Worming Activity
|
||||
command-and-control,T1071,1,Malicious User Agents - Powershell
|
||||
command-and-control,T1071,2,Malicious User Agents - CMD
|
||||
command-and-control,T1071,3,Malicious User Agents - Nix
|
||||
command-and-control,T1071,4,DNS Large Query Volume
|
||||
command-and-control,T1071,5,DNS Regular Beaconing
|
||||
command-and-control,T1071,6,DNS Long Domain Query
|
||||
command-and-control,T1071,7,DNS C2
|
||||
command-and-control,T1071,8,OSTap Payload Download
|
||||
command-and-control,T1032,1,OpenSSL C2
|
||||
command-and-control,T1095,1,ICMP C2
|
||||
command-and-control,T1095,2,Netcat C2
|
||||
command-and-control,T1095,3,Powercat C2
|
||||
command-and-control,T1065,1,Testing usage of uncommonly used port with PowerShell
|
||||
command-and-control,T1065,2,Testing usage of uncommonly used port
|
||||
command-and-control,T1102,1,Reach out to C2 Pointer URLs via command_prompt
|
||||
command-and-control,T1102,2,Reach out to C2 Pointer URLs via powershell
|
||||
initial-access,T1193,1,Download Phishing Attachment - VBScript
|
||||
|
@@ -0,0 +1,149 @@
|
||||
Tactic,Technique #,Test #,Test Name
|
||||
persistence,T1156,1,Add command to .bash_profile
|
||||
persistence,T1156,2,Add command to .bashrc
|
||||
persistence,T1176,1,Chrome (Developer Mode)
|
||||
persistence,T1176,2,Chrome (Chrome Web Store)
|
||||
persistence,T1176,3,Firefox
|
||||
persistence,T1136,1,Create a user account on a Linux system
|
||||
persistence,T1136,5,Create a new user in Linux with `root` UID and GID.
|
||||
persistence,T1158,1,Create a hidden file in a hidden directory
|
||||
persistence,T1215,1,Linux - Load Kernel Module via insmod
|
||||
persistence,T1168,1,Cron - Replace crontab with referenced file
|
||||
persistence,T1168,2,Cron - Add script to cron folder
|
||||
persistence,T1168,3,Event Monitor Daemon Persistence
|
||||
persistence,T1166,1,Make and modify binary from C source
|
||||
persistence,T1166,2,Set a SetUID flag on file
|
||||
persistence,T1166,3,Set a SetGID flag on file
|
||||
persistence,T1501,1,Create Systemd Service
|
||||
persistence,T1154,1,Trap
|
||||
impact,T1485,5,macOS/Linux - Overwrite file with DD
|
||||
impact,T1496,1,macOS/Linux - Simulate CPU Load with Yes
|
||||
impact,T1529,3,Restart System via `shutdown` - macOS/Linux
|
||||
impact,T1529,4,Shutdown System via `shutdown` - macOS/Linux
|
||||
impact,T1529,5,Restart System via `reboot` - macOS/Linux
|
||||
impact,T1529,6,Shutdown System via `halt` - Linux
|
||||
impact,T1529,7,Reboot System via `halt` - Linux
|
||||
impact,T1529,8,Shutdown System via `poweroff` - Linux
|
||||
impact,T1529,9,Reboot System via `poweroff` - Linux
|
||||
discovery,T1087,1,Enumerate all accounts
|
||||
discovery,T1087,2,View sudoers access
|
||||
discovery,T1087,3,View accounts with UID 0
|
||||
discovery,T1087,4,List opened files by user
|
||||
discovery,T1087,5,Show if a user account has ever logged in remotely
|
||||
discovery,T1087,6,Enumerate users and groups
|
||||
discovery,T1217,1,List Mozilla Firefox Bookmark Database Files on Linux
|
||||
discovery,T1083,3,Nix File and Diectory Discovery
|
||||
discovery,T1083,4,Nix File and Directory Discovery 2
|
||||
discovery,T1046,1,Port Scan
|
||||
discovery,T1046,2,Port Scan Nmap
|
||||
discovery,T1135,1,Network Share Discovery
|
||||
discovery,T1040,1,Packet Capture Linux
|
||||
discovery,T1201,1,Examine password complexity policy - Ubuntu
|
||||
discovery,T1201,2,Examine password complexity policy - CentOS/RHEL 7.x
|
||||
discovery,T1201,3,Examine password complexity policy - CentOS/RHEL 6.x
|
||||
discovery,T1201,4,Examine password expiration policy - All Linux
|
||||
discovery,T1069,1,Permission Groups Discovery
|
||||
discovery,T1057,1,Process Discovery - ps
|
||||
discovery,T1018,6,Remote System Discovery - arp nix
|
||||
discovery,T1018,7,Remote System Discovery - sweep
|
||||
discovery,T1082,2,System Information Discovery
|
||||
discovery,T1082,3,List OS Information
|
||||
discovery,T1082,4,Linux VM Check via Hardware
|
||||
discovery,T1082,5,Linux VM Check via Kernel Modules
|
||||
discovery,T1082,7,Hostname Discovery
|
||||
discovery,T1016,3,System Network Configuration Discovery
|
||||
discovery,T1049,3,System Network Connections Discovery Linux & MacOS
|
||||
discovery,T1033,2,System Owner/User Discovery
|
||||
credential-access,T1139,1,Search Through Bash History
|
||||
credential-access,T1081,2,Extract passwords with grep
|
||||
credential-access,T1040,1,Packet Capture Linux
|
||||
credential-access,T1145,2,Discover Private SSH Keys
|
||||
credential-access,T1145,3,Copy Private SSH Keys with CP
|
||||
credential-access,T1145,4,Copy Private SSH Keys with rsync
|
||||
defense-evasion,T1009,1,Pad Binary to Change Hash - Linux/macOS dd
|
||||
defense-evasion,T1146,1,Clear Bash history (rm)
|
||||
defense-evasion,T1146,2,Clear Bash history (echo)
|
||||
defense-evasion,T1146,3,Clear Bash history (cat dev/null)
|
||||
defense-evasion,T1146,4,Clear Bash history (ln dev/null)
|
||||
defense-evasion,T1146,5,Clear Bash history (truncate)
|
||||
defense-evasion,T1146,6,Clear history of a bunch of shells
|
||||
defense-evasion,T1090,1,Connection Proxy
|
||||
defense-evasion,T1089,1,Disable iptables firewall
|
||||
defense-evasion,T1089,2,Disable syslog
|
||||
defense-evasion,T1089,3,Disable Cb Response
|
||||
defense-evasion,T1089,4,Disable SELinux
|
||||
defense-evasion,T1107,1,Delete a single file - Linux/macOS
|
||||
defense-evasion,T1107,2,Delete an entire folder - Linux/macOS
|
||||
defense-evasion,T1107,3,Overwrite and delete a file with shred
|
||||
defense-evasion,T1107,12,Delete Filesystem - Linux
|
||||
defense-evasion,T1222,8,chmod - Change file or folder mode (numeric mode)
|
||||
defense-evasion,T1222,9,chmod - Change file or folder mode (symbolic mode)
|
||||
defense-evasion,T1222,10,chmod - Change file or folder mode (numeric mode) recursively
|
||||
defense-evasion,T1222,11,chmod - Change file or folder mode (symbolic mode) recursively
|
||||
defense-evasion,T1222,12,chown - Change file or folder ownership and group
|
||||
defense-evasion,T1222,13,chown - Change file or folder ownership and group recursively
|
||||
defense-evasion,T1222,14,chown - Change file or folder mode ownership only
|
||||
defense-evasion,T1222,15,chown - Change file or folder ownership recursively
|
||||
defense-evasion,T1222,16,chattr - Remove immutable file attribute
|
||||
defense-evasion,T1148,1,Disable history collection
|
||||
defense-evasion,T1148,2,Mac HISTCONTROL
|
||||
defense-evasion,T1158,1,Create a hidden file in a hidden directory
|
||||
defense-evasion,T1070,3,rm -rf
|
||||
defense-evasion,T1070,4,Overwrite Linux Mail Spool
|
||||
defense-evasion,T1070,5,Overwrite Linux Log
|
||||
defense-evasion,T1130,1,Install root CA on CentOS/RHEL
|
||||
defense-evasion,T1036,2,Masquerading as Linux crond process.
|
||||
defense-evasion,T1027,1,Decode base64 Data into Script
|
||||
defense-evasion,T1055,3,Shared Library Injection via /etc/ld.so.preload
|
||||
defense-evasion,T1055,4,Shared Library Injection via LD_PRELOAD
|
||||
defense-evasion,T1014,1,Loadable Kernel Module based Rootkit
|
||||
defense-evasion,T1014,2,Loadable Kernel Module based Rootkit
|
||||
defense-evasion,T1064,1,Create and Execute Bash Shell Script
|
||||
defense-evasion,T1099,1,Set a file's access timestamp
|
||||
defense-evasion,T1099,2,Set a file's modification timestamp
|
||||
defense-evasion,T1099,3,Set a file's creation timestamp
|
||||
defense-evasion,T1099,4,Modify file timestamps using reference file
|
||||
lateral-movement,T1105,1,rsync remote file copy (push)
|
||||
lateral-movement,T1105,2,rsync remote file copy (pull)
|
||||
lateral-movement,T1105,3,scp remote file copy (push)
|
||||
lateral-movement,T1105,4,scp remote file copy (pull)
|
||||
lateral-movement,T1105,5,sftp remote file copy (push)
|
||||
lateral-movement,T1105,6,sftp remote file copy (pull)
|
||||
collection,T1074,2,Stage data from Discovery.sh
|
||||
collection,T1113,3,X Windows Capture
|
||||
collection,T1113,4,Import
|
||||
exfiltration,T1002,3,Data Compressed - nix - zip
|
||||
exfiltration,T1002,4,Data Compressed - nix - gzip Single File
|
||||
exfiltration,T1002,5,Data Compressed - nix - tar Folder or File
|
||||
exfiltration,T1022,1,Data Encrypted with zip and gpg symmetric
|
||||
exfiltration,T1030,1,Data Transfer Size Limits
|
||||
exfiltration,T1048,1,Exfiltration Over Alternative Protocol - SSH
|
||||
exfiltration,T1048,2,Exfiltration Over Alternative Protocol - SSH
|
||||
exfiltration,T1048,3,Exfiltration Over Alternative Protocol - HTTP
|
||||
exfiltration,T1048,5,Exfiltration Over Alternative Protocol - DNS
|
||||
execution,T1059,1,Command-Line Interface
|
||||
execution,T1168,1,Cron - Replace crontab with referenced file
|
||||
execution,T1168,2,Cron - Add script to cron folder
|
||||
execution,T1168,3,Event Monitor Daemon Persistence
|
||||
execution,T1064,1,Create and Execute Bash Shell Script
|
||||
execution,T1153,1,Execute Script using Source
|
||||
execution,T1153,2,Execute Script using Source Alias
|
||||
execution,T1154,1,Trap
|
||||
command-and-control,T1090,1,Connection Proxy
|
||||
command-and-control,T1132,1,Base64 Encoded data.
|
||||
command-and-control,T1105,1,rsync remote file copy (push)
|
||||
command-and-control,T1105,2,rsync remote file copy (pull)
|
||||
command-and-control,T1105,3,scp remote file copy (push)
|
||||
command-and-control,T1105,4,scp remote file copy (pull)
|
||||
command-and-control,T1105,5,sftp remote file copy (push)
|
||||
command-and-control,T1105,6,sftp remote file copy (pull)
|
||||
command-and-control,T1071,3,Malicious User Agents - Nix
|
||||
command-and-control,T1065,2,Testing usage of uncommonly used port
|
||||
privilege-escalation,T1055,3,Shared Library Injection via /etc/ld.so.preload
|
||||
privilege-escalation,T1055,4,Shared Library Injection via LD_PRELOAD
|
||||
privilege-escalation,T1166,1,Make and modify binary from C source
|
||||
privilege-escalation,T1166,2,Set a SetUID flag on file
|
||||
privilege-escalation,T1166,3,Set a SetGID flag on file
|
||||
privilege-escalation,T1169,1,Sudo usage
|
||||
privilege-escalation,T1206,1,Unlimited sudo cache timeout
|
||||
privilege-escalation,T1206,2,Disable tty_tickets for sudo caching
|
||||
|
@@ -0,0 +1,160 @@
|
||||
Tactic,Technique #,Test #,Test Name
|
||||
persistence,T1156,1,Add command to .bash_profile
|
||||
persistence,T1156,2,Add command to .bashrc
|
||||
persistence,T1176,1,Chrome (Developer Mode)
|
||||
persistence,T1176,2,Chrome (Chrome Web Store)
|
||||
persistence,T1176,3,Firefox
|
||||
persistence,T1136,2,Create a user account on a MacOS system
|
||||
persistence,T1519,1,Persistance with Event Monitor - emond
|
||||
persistence,T1158,1,Create a hidden file in a hidden directory
|
||||
persistence,T1158,2,Mac Hidden file
|
||||
persistence,T1158,5,Hidden files
|
||||
persistence,T1158,6,Hide a Directory
|
||||
persistence,T1158,7,Show all hidden files
|
||||
persistence,T1159,1,Launch Agent
|
||||
persistence,T1160,1,Launch Daemon
|
||||
persistence,T1152,1,Launchctl
|
||||
persistence,T1168,1,Cron - Replace crontab with referenced file
|
||||
persistence,T1168,2,Cron - Add script to cron folder
|
||||
persistence,T1168,3,Event Monitor Daemon Persistence
|
||||
persistence,T1037,3,Logon Scripts - Mac
|
||||
persistence,T1150,1,Plist Modification
|
||||
persistence,T1163,1,rc.common
|
||||
persistence,T1164,1,Re-Opened Applications
|
||||
persistence,T1164,2,Re-Opened Applications
|
||||
persistence,T1166,1,Make and modify binary from C source
|
||||
persistence,T1166,2,Set a SetUID flag on file
|
||||
persistence,T1166,3,Set a SetGID flag on file
|
||||
persistence,T1165,1,add file to Local Library StartupItems
|
||||
persistence,T1154,1,Trap
|
||||
impact,T1485,5,macOS/Linux - Overwrite file with DD
|
||||
impact,T1496,1,macOS/Linux - Simulate CPU Load with Yes
|
||||
impact,T1529,3,Restart System via `shutdown` - macOS/Linux
|
||||
impact,T1529,4,Shutdown System via `shutdown` - macOS/Linux
|
||||
impact,T1529,5,Restart System via `reboot` - macOS/Linux
|
||||
discovery,T1087,1,Enumerate all accounts
|
||||
discovery,T1087,2,View sudoers access
|
||||
discovery,T1087,3,View accounts with UID 0
|
||||
discovery,T1087,4,List opened files by user
|
||||
discovery,T1087,6,Enumerate users and groups
|
||||
discovery,T1087,7,Enumerate users and groups
|
||||
discovery,T1217,2,List Mozilla Firefox Bookmark Database Files on macOS
|
||||
discovery,T1217,3,List Google Chrome Bookmark JSON Files on macOS
|
||||
discovery,T1083,3,Nix File and Diectory Discovery
|
||||
discovery,T1083,4,Nix File and Directory Discovery 2
|
||||
discovery,T1046,1,Port Scan
|
||||
discovery,T1046,2,Port Scan Nmap
|
||||
discovery,T1135,1,Network Share Discovery
|
||||
discovery,T1040,2,Packet Capture macOS
|
||||
discovery,T1201,7,Examine password policy - macOS
|
||||
discovery,T1069,1,Permission Groups Discovery
|
||||
discovery,T1057,1,Process Discovery - ps
|
||||
discovery,T1018,6,Remote System Discovery - arp nix
|
||||
discovery,T1018,7,Remote System Discovery - sweep
|
||||
discovery,T1063,3,Security Software Discovery - ps
|
||||
discovery,T1082,2,System Information Discovery
|
||||
discovery,T1082,3,List OS Information
|
||||
discovery,T1082,7,Hostname Discovery
|
||||
discovery,T1016,3,System Network Configuration Discovery
|
||||
discovery,T1049,3,System Network Connections Discovery Linux & MacOS
|
||||
discovery,T1033,2,System Owner/User Discovery
|
||||
execution,T1155,1,AppleScript
|
||||
execution,T1059,1,Command-Line Interface
|
||||
execution,T1152,1,Launchctl
|
||||
execution,T1168,1,Cron - Replace crontab with referenced file
|
||||
execution,T1168,2,Cron - Add script to cron folder
|
||||
execution,T1168,3,Event Monitor Daemon Persistence
|
||||
execution,T1064,1,Create and Execute Bash Shell Script
|
||||
execution,T1153,1,Execute Script using Source
|
||||
execution,T1153,2,Execute Script using Source Alias
|
||||
execution,T1151,1,Space After Filename
|
||||
execution,T1154,1,Trap
|
||||
lateral-movement,T1155,1,AppleScript
|
||||
lateral-movement,T1037,3,Logon Scripts - Mac
|
||||
lateral-movement,T1105,1,rsync remote file copy (push)
|
||||
lateral-movement,T1105,2,rsync remote file copy (pull)
|
||||
lateral-movement,T1105,3,scp remote file copy (push)
|
||||
lateral-movement,T1105,4,scp remote file copy (pull)
|
||||
lateral-movement,T1105,5,sftp remote file copy (push)
|
||||
lateral-movement,T1105,6,sftp remote file copy (pull)
|
||||
collection,T1074,2,Stage data from Discovery.sh
|
||||
collection,T1005,1,Search macOS Safari Cookies
|
||||
collection,T1113,1,Screencapture
|
||||
collection,T1113,2,Screencapture (silent)
|
||||
exfiltration,T1002,3,Data Compressed - nix - zip
|
||||
exfiltration,T1002,4,Data Compressed - nix - gzip Single File
|
||||
exfiltration,T1002,5,Data Compressed - nix - tar Folder or File
|
||||
exfiltration,T1022,1,Data Encrypted with zip and gpg symmetric
|
||||
exfiltration,T1030,1,Data Transfer Size Limits
|
||||
exfiltration,T1048,1,Exfiltration Over Alternative Protocol - SSH
|
||||
exfiltration,T1048,2,Exfiltration Over Alternative Protocol - SSH
|
||||
exfiltration,T1048,3,Exfiltration Over Alternative Protocol - HTTP
|
||||
credential-access,T1139,1,Search Through Bash History
|
||||
credential-access,T1081,1,Extract Browser and System credentials with LaZagne
|
||||
credential-access,T1081,2,Extract passwords with grep
|
||||
credential-access,T1141,1,AppleScript - Prompt User for Password
|
||||
credential-access,T1142,1,Keychain
|
||||
credential-access,T1040,2,Packet Capture macOS
|
||||
credential-access,T1145,2,Discover Private SSH Keys
|
||||
credential-access,T1145,4,Copy Private SSH Keys with rsync
|
||||
defense-evasion,T1009,1,Pad Binary to Change Hash - Linux/macOS dd
|
||||
defense-evasion,T1146,1,Clear Bash history (rm)
|
||||
defense-evasion,T1146,2,Clear Bash history (echo)
|
||||
defense-evasion,T1146,3,Clear Bash history (cat dev/null)
|
||||
defense-evasion,T1146,4,Clear Bash history (ln dev/null)
|
||||
defense-evasion,T1146,6,Clear history of a bunch of shells
|
||||
defense-evasion,T1090,1,Connection Proxy
|
||||
defense-evasion,T1089,5,Disable Carbon Black Response
|
||||
defense-evasion,T1089,6,Disable LittleSnitch
|
||||
defense-evasion,T1089,7,Disable OpenDNS Umbrella
|
||||
defense-evasion,T1107,1,Delete a single file - Linux/macOS
|
||||
defense-evasion,T1107,2,Delete an entire folder - Linux/macOS
|
||||
defense-evasion,T1107,14,Delete TeamViewer Log Files
|
||||
defense-evasion,T1222,8,chmod - Change file or folder mode (numeric mode)
|
||||
defense-evasion,T1222,9,chmod - Change file or folder mode (symbolic mode)
|
||||
defense-evasion,T1222,10,chmod - Change file or folder mode (numeric mode) recursively
|
||||
defense-evasion,T1222,11,chmod - Change file or folder mode (symbolic mode) recursively
|
||||
defense-evasion,T1222,12,chown - Change file or folder ownership and group
|
||||
defense-evasion,T1222,13,chown - Change file or folder ownership and group recursively
|
||||
defense-evasion,T1222,14,chown - Change file or folder mode ownership only
|
||||
defense-evasion,T1222,15,chown - Change file or folder ownership recursively
|
||||
defense-evasion,T1222,16,chattr - Remove immutable file attribute
|
||||
defense-evasion,T1144,1,Gatekeeper Bypass
|
||||
defense-evasion,T1148,1,Disable history collection
|
||||
defense-evasion,T1148,2,Mac HISTCONTROL
|
||||
defense-evasion,T1158,1,Create a hidden file in a hidden directory
|
||||
defense-evasion,T1158,2,Mac Hidden file
|
||||
defense-evasion,T1158,5,Hidden files
|
||||
defense-evasion,T1158,6,Hide a Directory
|
||||
defense-evasion,T1158,7,Show all hidden files
|
||||
defense-evasion,T1147,1,Hidden Users
|
||||
defense-evasion,T1070,3,rm -rf
|
||||
defense-evasion,T1152,1,Launchctl
|
||||
defense-evasion,T1027,1,Decode base64 Data into Script
|
||||
defense-evasion,T1150,1,Plist Modification
|
||||
defense-evasion,T1064,1,Create and Execute Bash Shell Script
|
||||
defense-evasion,T1151,1,Space After Filename
|
||||
defense-evasion,T1099,1,Set a file's access timestamp
|
||||
defense-evasion,T1099,2,Set a file's modification timestamp
|
||||
defense-evasion,T1099,3,Set a file's creation timestamp
|
||||
defense-evasion,T1099,4,Modify file timestamps using reference file
|
||||
command-and-control,T1090,1,Connection Proxy
|
||||
command-and-control,T1132,1,Base64 Encoded data.
|
||||
command-and-control,T1105,1,rsync remote file copy (push)
|
||||
command-and-control,T1105,2,rsync remote file copy (pull)
|
||||
command-and-control,T1105,3,scp remote file copy (push)
|
||||
command-and-control,T1105,4,scp remote file copy (pull)
|
||||
command-and-control,T1105,5,sftp remote file copy (push)
|
||||
command-and-control,T1105,6,sftp remote file copy (pull)
|
||||
command-and-control,T1071,3,Malicious User Agents - Nix
|
||||
command-and-control,T1065,2,Testing usage of uncommonly used port
|
||||
privilege-escalation,T1519,1,Persistance with Event Monitor - emond
|
||||
privilege-escalation,T1160,1,Launch Daemon
|
||||
privilege-escalation,T1150,1,Plist Modification
|
||||
privilege-escalation,T1166,1,Make and modify binary from C source
|
||||
privilege-escalation,T1166,2,Set a SetUID flag on file
|
||||
privilege-escalation,T1166,3,Set a SetGID flag on file
|
||||
privilege-escalation,T1165,1,add file to Local Library StartupItems
|
||||
privilege-escalation,T1169,1,Sudo usage
|
||||
privilege-escalation,T1206,1,Unlimited sudo cache timeout
|
||||
privilege-escalation,T1206,2,Disable tty_tickets for sudo caching
|
||||
|
@@ -0,0 +1,461 @@
|
||||
Tactic,Technique #,Test #,Test Name
|
||||
defense-evasion,T1197,1,Bitsadmin Download (cmd)
|
||||
defense-evasion,T1197,2,Bitsadmin Download (PowerShell)
|
||||
defense-evasion,T1197,3,"Persist, Download, & Execute"
|
||||
defense-evasion,T1088,1,Bypass UAC using Event Viewer (cmd)
|
||||
defense-evasion,T1088,2,Bypass UAC using Event Viewer (PowerShell)
|
||||
defense-evasion,T1088,3,Bypass UAC using Fodhelper
|
||||
defense-evasion,T1088,4,Bypass UAC using Fodhelper - PowerShell
|
||||
defense-evasion,T1088,5,Bypass UAC using ComputerDefaults (PowerShell)
|
||||
defense-evasion,T1088,6,Bypass UAC by Mocking Trusted Directories
|
||||
defense-evasion,T1191,1,CMSTP Executing Remote Scriptlet
|
||||
defense-evasion,T1191,2,CMSTP Executing UAC Bypass
|
||||
defense-evasion,T1500,1,Compile After Delivery using csc.exe
|
||||
defense-evasion,T1223,1,Compiled HTML Help Local Payload
|
||||
defense-evasion,T1223,2,Compiled HTML Help Remote Payload
|
||||
defense-evasion,T1090,2,portproxy reg key
|
||||
defense-evasion,T1196,1,Control Panel Items
|
||||
defense-evasion,T1207,1,DCShadow - Mimikatz
|
||||
defense-evasion,T1038,1,DLL Search Order Hijacking - amsi.dll
|
||||
defense-evasion,T1073,1,DLL Side-Loading using the Notepad++ GUP.exe binary
|
||||
defense-evasion,T1140,1,Deobfuscate/Decode Files Or Information
|
||||
defense-evasion,T1140,2,Certutil Rename and Decode
|
||||
defense-evasion,T1089,8,Unload Sysmon Filter Driver
|
||||
defense-evasion,T1089,9,Disable Windows IIS HTTP Logging
|
||||
defense-evasion,T1089,10,Uninstall Sysmon
|
||||
defense-evasion,T1089,11,AMSI Bypass - AMSI InitFailed
|
||||
defense-evasion,T1089,12,AMSI Bypass - Remove AMSI Provider Reg Key
|
||||
defense-evasion,T1089,13,Disable Arbitrary Security Windows Service
|
||||
defense-evasion,T1089,14,Disable PowerShell Script Block Logging
|
||||
defense-evasion,T1089,15,PowerShell Bypass of AntiMalware Scripting Interface
|
||||
defense-evasion,T1089,16,Tamper with Windows Defender ATP PowerShell
|
||||
defense-evasion,T1089,17,Tamper with Windows Defender Command Prompt
|
||||
defense-evasion,T1089,18,Tamper with Windows Defender Registry
|
||||
defense-evasion,T1089,19,Disable Microft Office Security Features
|
||||
defense-evasion,T1089,20,Remove Windows Defender Definition Files
|
||||
defense-evasion,T1107,4,Delete a single file - Windows cmd
|
||||
defense-evasion,T1107,5,Delete an entire folder - Windows cmd
|
||||
defense-evasion,T1107,6,Delete a single file - Windows PowerShell
|
||||
defense-evasion,T1107,7,Delete an entire folder - Windows PowerShell
|
||||
defense-evasion,T1107,8,Delete VSS - vssadmin
|
||||
defense-evasion,T1107,9,Delete VSS - wmic
|
||||
defense-evasion,T1107,10,bcdedit
|
||||
defense-evasion,T1107,11,wbadmin
|
||||
defense-evasion,T1107,13,Delete-PrefetchFile
|
||||
defense-evasion,T1107,14,Delete TeamViewer Log Files
|
||||
defense-evasion,T1222,1,Take ownership using takeown utility
|
||||
defense-evasion,T1222,2,Take ownership recursively using takeown utility
|
||||
defense-evasion,T1222,3,cacls - Grant permission to specified user or group
|
||||
defense-evasion,T1222,4,cacls - Grant permission to specified user or group recursively
|
||||
defense-evasion,T1222,5,icacls - Grant permission to specified user or group
|
||||
defense-evasion,T1222,6,icacls - Grant permission to specified user or group recursively
|
||||
defense-evasion,T1222,7,attrib - Remove read-only attribute
|
||||
defense-evasion,T1158,3,Create Windows System File with Attrib
|
||||
defense-evasion,T1158,4,Create Windows Hidden File with Attrib
|
||||
defense-evasion,T1158,8,Create ADS command prompt
|
||||
defense-evasion,T1158,9,Create ADS PowerShell
|
||||
defense-evasion,T1143,1,Hidden Window
|
||||
defense-evasion,T1183,1,IFEO Add Debugger
|
||||
defense-evasion,T1183,2,IFEO Global Flags
|
||||
defense-evasion,T1070,1,Clear Logs
|
||||
defense-evasion,T1070,2,FSUtil
|
||||
defense-evasion,T1070,6,Delete System Logs Using PowerShell
|
||||
defense-evasion,T1070,7,Delete System Logs Using Clear-EventLogId
|
||||
defense-evasion,T1202,1,Indirect Command Execution - pcalua.exe
|
||||
defense-evasion,T1202,2,Indirect Command Execution - forfiles.exe
|
||||
defense-evasion,T1118,1,CheckIfInstallable method call
|
||||
defense-evasion,T1118,2,InstallHelper method call
|
||||
defense-evasion,T1118,3,InstallUtil class constructor method call
|
||||
defense-evasion,T1118,4,InstallUtil Install method call
|
||||
defense-evasion,T1118,5,InstallUtil Uninstall method call - /U variant
|
||||
defense-evasion,T1118,6,InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant
|
||||
defense-evasion,T1118,7,InstallUtil HelpText method call
|
||||
defense-evasion,T1118,8,InstallUtil evasive invocation
|
||||
defense-evasion,T1036,1,Masquerading as Windows LSASS process
|
||||
defense-evasion,T1036,3,Masquerading - cscript.exe running as notepad.exe
|
||||
defense-evasion,T1036,4,Masquerading - wscript.exe running as svchost.exe
|
||||
defense-evasion,T1036,5,Masquerading - powershell.exe running as taskhostw.exe
|
||||
defense-evasion,T1036,6,Masquerading - non-windows exe running as windows exe
|
||||
defense-evasion,T1036,7,Masquerading - windows exe running as different windows exe
|
||||
defense-evasion,T1036,8,Malicious process Masquerading as LSM.exe
|
||||
defense-evasion,T1112,1,Modify Registry of Current User Profile - cmd
|
||||
defense-evasion,T1112,2,Modify Registry of Local Machine - cmd
|
||||
defense-evasion,T1112,3,Modify Registry of Another User Profile
|
||||
defense-evasion,T1112,4,Modify registry to store logon credentials
|
||||
defense-evasion,T1112,5,Modify registry to store PowerShell code
|
||||
defense-evasion,T1112,6,Add domain to Trusted sites Zone
|
||||
defense-evasion,T1112,7,Javascript in registry
|
||||
defense-evasion,T1170,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject
|
||||
defense-evasion,T1170,2,Mshta calls a local VBScript file to launch notepad.exe
|
||||
defense-evasion,T1170,3,Mshta executes VBScript to execute malicious command
|
||||
defense-evasion,T1170,4,Mshta Executes Remote HTML Application (HTA)
|
||||
defense-evasion,T1096,1,Alternate Data Streams (ADS)
|
||||
defense-evasion,T1096,2,Store file in Alternate Data Stream (ADS)
|
||||
defense-evasion,T1126,1,Add Network Share
|
||||
defense-evasion,T1126,2,Remove Network Share
|
||||
defense-evasion,T1126,3,Remove Network Share PowerShell
|
||||
defense-evasion,T1027,2,Execute base64-encoded PowerShell
|
||||
defense-evasion,T1027,3,Execute base64-encoded PowerShell from Windows Registry
|
||||
defense-evasion,T1502,1,Parent PID Spoofing using PowerShell
|
||||
defense-evasion,T1093,1,Process Hollowing using PowerShell
|
||||
defense-evasion,T1055,1,Process Injection via mavinject.exe
|
||||
defense-evasion,T1055,2,Process Injection via PowerSploit
|
||||
defense-evasion,T1055,5,Process Injection via C#
|
||||
defense-evasion,T1055,6,svchost writing a file to a UNC path
|
||||
defense-evasion,T1121,1,Regasm Uninstall Method Call Test
|
||||
defense-evasion,T1121,2,Regsvs Uninstall Method Call Test
|
||||
defense-evasion,T1117,1,Regsvr32 local COM scriptlet execution
|
||||
defense-evasion,T1117,2,Regsvr32 remote COM scriptlet execution
|
||||
defense-evasion,T1117,3,Regsvr32 local DLL execution
|
||||
defense-evasion,T1014,3,Windows Signed Driver Rootkit Test
|
||||
defense-evasion,T1085,1,Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
defense-evasion,T1085,2,Rundll32 execute VBscript command
|
||||
defense-evasion,T1085,3,Rundll32 advpack.dll Execution
|
||||
defense-evasion,T1085,4,Rundll32 ieadvpack.dll Execution
|
||||
defense-evasion,T1085,5,Rundll32 syssetup.dll Execution
|
||||
defense-evasion,T1085,6,Rundll32 setupapi.dll Execution
|
||||
defense-evasion,T1064,2,Create and Execute Batch Script
|
||||
defense-evasion,T1218,1,mavinject - Inject DLL into running process
|
||||
defense-evasion,T1218,2,SyncAppvPublishingServer - Execute arbitrary PowerShell code
|
||||
defense-evasion,T1218,3,Register-CimProvider - Execute evil dll
|
||||
defense-evasion,T1218,4,Msiexec.exe - Execute Local MSI file
|
||||
defense-evasion,T1218,5,Msiexec.exe - Execute Remote MSI file
|
||||
defense-evasion,T1218,6,Msiexec.exe - Execute Arbitrary DLL
|
||||
defense-evasion,T1218,7,Odbcconf.exe - Execute Arbitrary DLL
|
||||
defense-evasion,T1218,8,InfDefaultInstall.exe .inf Execution
|
||||
defense-evasion,T1216,1,PubPrn.vbs Signed Script Bypass
|
||||
defense-evasion,T1216,2,SyncAppvPublishingServer Signed Script PowerShell Command Execution
|
||||
defense-evasion,T1216,3,manage-bde.wsf Signed Script Command Execution
|
||||
defense-evasion,T1099,5,Windows - Modify file creation timestamp with PowerShell
|
||||
defense-evasion,T1099,6,Windows - Modify file last modified timestamp with PowerShell
|
||||
defense-evasion,T1099,7,Windows - Modify file last access timestamp with PowerShell
|
||||
defense-evasion,T1127,1,MSBuild Bypass Using Inline Tasks
|
||||
defense-evasion,T1102,1,Reach out to C2 Pointer URLs via command_prompt
|
||||
defense-evasion,T1102,2,Reach out to C2 Pointer URLs via powershell
|
||||
defense-evasion,T1220,1,MSXSL Bypass using local files
|
||||
defense-evasion,T1220,2,MSXSL Bypass using remote files
|
||||
defense-evasion,T1220,3,WMIC bypass using local XSL file
|
||||
defense-evasion,T1220,4,WMIC bypass using remote XSL file
|
||||
privilege-escalation,T1015,1,Attaches Command Prompt as a Debugger to a List of Target Processes
|
||||
privilege-escalation,T1103,1,Install AppInit Shim
|
||||
privilege-escalation,T1138,1,Application Shim Installation
|
||||
privilege-escalation,T1138,2,New shim database files created in the default shim database directory
|
||||
privilege-escalation,T1138,3,Registry key creation and/or modification events for SDB
|
||||
privilege-escalation,T1088,1,Bypass UAC using Event Viewer (cmd)
|
||||
privilege-escalation,T1088,2,Bypass UAC using Event Viewer (PowerShell)
|
||||
privilege-escalation,T1088,3,Bypass UAC using Fodhelper
|
||||
privilege-escalation,T1088,4,Bypass UAC using Fodhelper - PowerShell
|
||||
privilege-escalation,T1088,5,Bypass UAC using ComputerDefaults (PowerShell)
|
||||
privilege-escalation,T1088,6,Bypass UAC by Mocking Trusted Directories
|
||||
privilege-escalation,T1038,1,DLL Search Order Hijacking - amsi.dll
|
||||
privilege-escalation,T1044,1,File System Permissions Weakness
|
||||
privilege-escalation,T1179,1,Hook PowerShell TLS Encrypt/Decrypt Messages
|
||||
privilege-escalation,T1183,1,IFEO Add Debugger
|
||||
privilege-escalation,T1183,2,IFEO Global Flags
|
||||
privilege-escalation,T1050,1,Service Installation
|
||||
privilege-escalation,T1050,2,Service Installation PowerShell
|
||||
privilege-escalation,T1502,1,Parent PID Spoofing using PowerShell
|
||||
privilege-escalation,T1504,1,Append malicious start-process cmdlet
|
||||
privilege-escalation,T1055,1,Process Injection via mavinject.exe
|
||||
privilege-escalation,T1055,2,Process Injection via PowerSploit
|
||||
privilege-escalation,T1055,5,Process Injection via C#
|
||||
privilege-escalation,T1055,6,svchost writing a file to a UNC path
|
||||
privilege-escalation,T1053,1,At.exe Scheduled task
|
||||
privilege-escalation,T1053,2,Scheduled task Local
|
||||
privilege-escalation,T1053,3,Scheduled task Remote
|
||||
privilege-escalation,T1053,4,Powershell Cmdlet Scheduled Task
|
||||
privilege-escalation,T1058,1,Service Registry Permissions Weakness
|
||||
privilege-escalation,T1100,1,Web Shell Written to Disk
|
||||
persistence,T1015,1,Attaches Command Prompt as a Debugger to a List of Target Processes
|
||||
persistence,T1098,1,Admin Account Manipulate
|
||||
persistence,T1103,1,Install AppInit Shim
|
||||
persistence,T1138,1,Application Shim Installation
|
||||
persistence,T1138,2,New shim database files created in the default shim database directory
|
||||
persistence,T1138,3,Registry key creation and/or modification events for SDB
|
||||
persistence,T1197,1,Bitsadmin Download (cmd)
|
||||
persistence,T1197,2,Bitsadmin Download (PowerShell)
|
||||
persistence,T1197,3,"Persist, Download, & Execute"
|
||||
persistence,T1176,1,Chrome (Developer Mode)
|
||||
persistence,T1176,2,Chrome (Chrome Web Store)
|
||||
persistence,T1176,3,Firefox
|
||||
persistence,T1042,1,Change Default File Association
|
||||
persistence,T1136,3,Create a new user in a command prompt
|
||||
persistence,T1136,4,Create a new user in PowerShell
|
||||
persistence,T1038,1,DLL Search Order Hijacking - amsi.dll
|
||||
persistence,T1044,1,File System Permissions Weakness
|
||||
persistence,T1158,3,Create Windows System File with Attrib
|
||||
persistence,T1158,4,Create Windows Hidden File with Attrib
|
||||
persistence,T1158,8,Create ADS command prompt
|
||||
persistence,T1158,9,Create ADS PowerShell
|
||||
persistence,T1179,1,Hook PowerShell TLS Encrypt/Decrypt Messages
|
||||
persistence,T1062,1,Installing Hyper-V Feature
|
||||
persistence,T1183,1,IFEO Add Debugger
|
||||
persistence,T1183,2,IFEO Global Flags
|
||||
persistence,T1037,1,Logon Scripts
|
||||
persistence,T1037,2,Scheduled Task Startup Script
|
||||
persistence,T1037,4,Supicious vbs file run from startup Folder
|
||||
persistence,T1037,5,Supicious jse file run from startup Folder
|
||||
persistence,T1037,6,Supicious bat file run from startup Folder
|
||||
persistence,T1031,1,Modify Fax service to run PowerShell
|
||||
persistence,T1128,1,Netsh Helper DLL Registration
|
||||
persistence,T1050,1,Service Installation
|
||||
persistence,T1050,2,Service Installation PowerShell
|
||||
persistence,T1137,1,DDEAUTO
|
||||
persistence,T1504,1,Append malicious start-process cmdlet
|
||||
persistence,T1060,1,Reg Key Run
|
||||
persistence,T1060,2,Reg Key RunOnce
|
||||
persistence,T1060,3,PowerShell Registry RunOnce
|
||||
persistence,T1053,1,At.exe Scheduled task
|
||||
persistence,T1053,2,Scheduled task Local
|
||||
persistence,T1053,3,Scheduled task Remote
|
||||
persistence,T1053,4,Powershell Cmdlet Scheduled Task
|
||||
persistence,T1180,1,Set Arbitrary Binary as Screensaver
|
||||
persistence,T1101,1,Modify SSP configuration in registry
|
||||
persistence,T1505,1,Install MS Exchange Transport Agent Persistence
|
||||
persistence,T1058,1,Service Registry Permissions Weakness
|
||||
persistence,T1023,1,Shortcut Modification
|
||||
persistence,T1023,2,Create shortcut to cmd in startup folders
|
||||
persistence,T1100,1,Web Shell Written to Disk
|
||||
persistence,T1084,1,Persistence
|
||||
persistence,T1004,1,Winlogon Shell Key Persistence - PowerShell
|
||||
persistence,T1004,2,Winlogon Userinit Key Persistence - PowerShell
|
||||
persistence,T1004,3,Winlogon Notify Key Logon Persistence - PowerShell
|
||||
impact,T1531,1,Change User Password - Windows
|
||||
impact,T1531,2,Delete User - Windows
|
||||
impact,T1485,1,Windows - Delete Volume Shadow Copies
|
||||
impact,T1485,2,Windows - Delete Windows Backup Catalog
|
||||
impact,T1485,3,Windows - Disable Windows Recovery Console Repair
|
||||
impact,T1485,4,Windows - Overwrite file with Sysinternals SDelete
|
||||
impact,T1485,6,Windows - Delete Backup Files
|
||||
impact,T1490,1,Windows - Delete Volume Shadow Copies
|
||||
impact,T1490,2,Windows - Delete Volume Shadow Copies via WMI
|
||||
impact,T1490,3,Windows - Delete Windows Backup Catalog
|
||||
impact,T1490,4,Windows - Disable Windows Recovery Console Repair
|
||||
impact,T1490,5,Windows - Delete Volume Shadow Copies via WMI with PowerShell
|
||||
impact,T1489,1,Windows - Stop service using Service Controller
|
||||
impact,T1489,2,Windows - Stop service using net.exe
|
||||
impact,T1489,3,Windows - Stop service by killing process
|
||||
impact,T1529,1,Shutdown System - Windows
|
||||
impact,T1529,2,Restart System - Windows
|
||||
discovery,T1087,8,Enumerate all accounts
|
||||
discovery,T1087,9,Enumerate all accounts via PowerShell
|
||||
discovery,T1087,10,Enumerate logged on users
|
||||
discovery,T1087,11,Enumerate logged on users via PowerShell
|
||||
discovery,T1010,1,List Process Main Windows - C# .NET
|
||||
discovery,T1217,4,List Google Chrome Bookmarks on Windows with powershell
|
||||
discovery,T1217,5,List Google Chrome Bookmarks on Windows with command prompt
|
||||
discovery,T1482,1,Windows - Discover domain trusts with dsquery
|
||||
discovery,T1482,2,Windows - Discover domain trusts with nltest
|
||||
discovery,T1482,3,Powershell enumerate domains and forests
|
||||
discovery,T1083,1,File and Directory Discovery (cmd.exe)
|
||||
discovery,T1083,2,File and Directory Discovery (PowerShell)
|
||||
discovery,T1135,2,Network Share Discovery command prompt
|
||||
discovery,T1135,3,Network Share Discovery PowerShell
|
||||
discovery,T1135,4,View available share drives
|
||||
discovery,T1040,3,Packet Capture Windows Command Prompt
|
||||
discovery,T1040,4,Packet Capture PowerShell
|
||||
discovery,T1201,5,Examine local password policy - Windows
|
||||
discovery,T1201,6,Examine domain password policy - Windows
|
||||
discovery,T1069,2,Basic Permission Groups Discovery Windows
|
||||
discovery,T1069,3,Permission Groups Discovery PowerShell
|
||||
discovery,T1069,4,Elevated group enumeration using net group
|
||||
discovery,T1057,2,Process Discovery - tasklist
|
||||
discovery,T1012,1,Query Registry
|
||||
discovery,T1018,1,Remote System Discovery - net
|
||||
discovery,T1018,2,Remote System Discovery - net group Domain Computers
|
||||
discovery,T1018,3,Remote System Discovery - nltest
|
||||
discovery,T1018,4,Remote System Discovery - ping sweep
|
||||
discovery,T1018,5,Remote System Discovery - arp
|
||||
discovery,T1018,8,Remote System Discovery - nslookup
|
||||
discovery,T1063,1,Security Software Discovery
|
||||
discovery,T1063,2,Security Software Discovery - powershell
|
||||
discovery,T1063,4,Security Software Discovery - Sysmon Service
|
||||
discovery,T1063,5,Security Software Discovery - AV Discovery via WMI
|
||||
discovery,T1518,1,Find and Display Internet Explorer Browser Version
|
||||
discovery,T1518,2,Applications Installed
|
||||
discovery,T1082,1,System Information Discovery
|
||||
discovery,T1082,6,Hostname Discovery (Windows)
|
||||
discovery,T1082,8,Windows MachineGUID Discovery
|
||||
discovery,T1016,1,System Network Configuration Discovery
|
||||
discovery,T1016,2,List Windows Firewall Rules
|
||||
discovery,T1016,4,System Network Configuration Discovery (TrickBot Style)
|
||||
discovery,T1016,5,List Open Egress Ports
|
||||
discovery,T1049,1,System Network Connections Discovery
|
||||
discovery,T1049,2,System Network Connections Discovery with PowerShell
|
||||
discovery,T1033,1,System Owner/User Discovery
|
||||
discovery,T1007,1,System Service Discovery
|
||||
discovery,T1007,2,System Service Discovery - net.exe
|
||||
discovery,T1124,1,System Time Discovery
|
||||
discovery,T1124,2,System Time Discovery - PowerShell
|
||||
credential-access,T1098,1,Admin Account Manipulate
|
||||
credential-access,T1110,1,Brute Force Credentials
|
||||
credential-access,T1003,1,Powershell Mimikatz
|
||||
credential-access,T1003,2,Gsecdump
|
||||
credential-access,T1003,3,Windows Credential Editor
|
||||
credential-access,T1003,4,"Registry dump of SAM, creds, and secrets"
|
||||
credential-access,T1003,5,Dump LSASS.exe Memory using ProcDump
|
||||
credential-access,T1003,6,Dump LSASS.exe Memory using Windows Task Manager
|
||||
credential-access,T1003,7,Offline Credential Theft With Mimikatz
|
||||
credential-access,T1003,8,Dump Active Directory Database with NTDSUtil
|
||||
credential-access,T1003,9,Create Volume Shadow Copy with NTDS.dit
|
||||
credential-access,T1003,10,Copy NTDS.dit from Volume Shadow Copy
|
||||
credential-access,T1003,11,GPP Passwords (findstr)
|
||||
credential-access,T1003,12,GPP Passwords (Get-GPPPassword)
|
||||
credential-access,T1003,13,LSASS read with pypykatz
|
||||
credential-access,T1003,14,Registry parse with pypykatz
|
||||
credential-access,T1081,3,Extracting passwords with findstr
|
||||
credential-access,T1081,4,Access unattend.xml
|
||||
credential-access,T1214,1,Enumeration for Credentials in Registry
|
||||
credential-access,T1214,2,Enumeration for PuTTY Credentials in Registry
|
||||
credential-access,T1179,1,Hook PowerShell TLS Encrypt/Decrypt Messages
|
||||
credential-access,T1056,1,Input Capture
|
||||
credential-access,T1141,2,PowerShell - Prompt User for Password
|
||||
credential-access,T1208,1,Request for service tickets
|
||||
credential-access,T1040,3,Packet Capture Windows Command Prompt
|
||||
credential-access,T1040,4,Packet Capture PowerShell
|
||||
credential-access,T1174,1,Install and Register Password Filter DLL
|
||||
credential-access,T1145,1,Private Keys
|
||||
lateral-movement,T1037,1,Logon Scripts
|
||||
lateral-movement,T1037,2,Scheduled Task Startup Script
|
||||
lateral-movement,T1037,4,Supicious vbs file run from startup Folder
|
||||
lateral-movement,T1037,5,Supicious jse file run from startup Folder
|
||||
lateral-movement,T1037,6,Supicious bat file run from startup Folder
|
||||
lateral-movement,T1075,1,Mimikatz Pass the Hash
|
||||
lateral-movement,T1075,2,crackmapexec Pass the Hash
|
||||
lateral-movement,T1097,1,Mimikatz Kerberos Ticket Attack
|
||||
lateral-movement,T1076,1,RDP
|
||||
lateral-movement,T1076,2,RDPto-DomainController
|
||||
lateral-movement,T1105,7,certutil download (urlcache)
|
||||
lateral-movement,T1105,8,certutil download (verifyctl)
|
||||
lateral-movement,T1105,9,Windows - BITSAdmin BITS Download
|
||||
lateral-movement,T1105,10,Windows - PowerShell Download
|
||||
lateral-movement,T1105,11,OSTAP Worming Activity
|
||||
lateral-movement,T1077,1,Map admin share
|
||||
lateral-movement,T1077,2,Map Admin Share PowerShell
|
||||
lateral-movement,T1077,3,Copy and Execute File with PsExec
|
||||
lateral-movement,T1077,4,Execute command writing output to local Admin Share
|
||||
lateral-movement,T1028,1,Enable Windows Remote Management
|
||||
lateral-movement,T1028,2,PowerShell Lateral Movement
|
||||
lateral-movement,T1028,3,WMIC Process Call Create
|
||||
lateral-movement,T1028,4,Psexec
|
||||
lateral-movement,T1028,5,Invoke-Command
|
||||
collection,T1123,1,using device audio capture commandlet
|
||||
collection,T1119,1,Automated Collection Command Prompt
|
||||
collection,T1119,2,Automated Collection PowerShell
|
||||
collection,T1119,3,Recon information for export with PowerShell
|
||||
collection,T1119,4,Recon information for export with Command Prompt
|
||||
collection,T1115,1,Utilize Clipboard to store or execute commands from
|
||||
collection,T1115,2,PowerShell
|
||||
collection,T1074,1,Stage data from Discovery.bat
|
||||
collection,T1074,3,Zip a Folder with PowerShell for Staging in Temp
|
||||
collection,T1114,1,T1114 Email Collection with PowerShell
|
||||
collection,T1056,1,Input Capture
|
||||
exfiltration,T1002,1,Compress Data for Exfiltration With PowerShell
|
||||
exfiltration,T1002,2,Compress Data for Exfiltration With Rar
|
||||
exfiltration,T1022,2,Compress Data and lock with password for Exfiltration with winrar
|
||||
exfiltration,T1022,3,Compress Data and lock with password for Exfiltration with winzip
|
||||
exfiltration,T1022,4,Compress Data and lock with password for Exfiltration with 7zip
|
||||
exfiltration,T1048,4,Exfiltration Over Alternative Protocol - ICMP
|
||||
execution,T1191,1,CMSTP Executing Remote Scriptlet
|
||||
execution,T1191,2,CMSTP Executing UAC Bypass
|
||||
execution,T1223,1,Compiled HTML Help Local Payload
|
||||
execution,T1223,2,Compiled HTML Help Remote Payload
|
||||
execution,T1196,1,Control Panel Items
|
||||
execution,T1173,1,Execute Commands
|
||||
execution,T1173,2,Execute PowerShell script via Word DDE
|
||||
execution,T1118,1,CheckIfInstallable method call
|
||||
execution,T1118,2,InstallHelper method call
|
||||
execution,T1118,3,InstallUtil class constructor method call
|
||||
execution,T1118,4,InstallUtil Install method call
|
||||
execution,T1118,5,InstallUtil Uninstall method call - /U variant
|
||||
execution,T1118,6,InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant
|
||||
execution,T1118,7,InstallUtil HelpText method call
|
||||
execution,T1118,8,InstallUtil evasive invocation
|
||||
execution,T1170,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject
|
||||
execution,T1170,2,Mshta calls a local VBScript file to launch notepad.exe
|
||||
execution,T1170,3,Mshta executes VBScript to execute malicious command
|
||||
execution,T1170,4,Mshta Executes Remote HTML Application (HTA)
|
||||
execution,T1086,1,Mimikatz
|
||||
execution,T1086,2,BloodHound
|
||||
execution,T1086,3,Obfuscation Tests
|
||||
execution,T1086,4,Mimikatz - Cradlecraft PsSendKeys
|
||||
execution,T1086,5,Invoke-AppPathBypass
|
||||
execution,T1086,6,PowerShell Add User
|
||||
execution,T1086,7,Powershell MsXml COM object - no prompt
|
||||
execution,T1086,8,Powershell MsXml COM object - with prompt
|
||||
execution,T1086,9,Powershell XML requests
|
||||
execution,T1086,10,Powershell invoke mshta.exe download
|
||||
execution,T1086,11,Powershell Invoke-DownloadCradle
|
||||
execution,T1086,12,PowerShell Fileless Script Execution
|
||||
execution,T1086,13,PowerShell Downgrade Attack
|
||||
execution,T1086,14,NTFS Alternate Data Stream Access
|
||||
execution,T1121,1,Regasm Uninstall Method Call Test
|
||||
execution,T1121,2,Regsvs Uninstall Method Call Test
|
||||
execution,T1117,1,Regsvr32 local COM scriptlet execution
|
||||
execution,T1117,2,Regsvr32 remote COM scriptlet execution
|
||||
execution,T1117,3,Regsvr32 local DLL execution
|
||||
execution,T1085,1,Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
execution,T1085,2,Rundll32 execute VBscript command
|
||||
execution,T1085,3,Rundll32 advpack.dll Execution
|
||||
execution,T1085,4,Rundll32 ieadvpack.dll Execution
|
||||
execution,T1085,5,Rundll32 syssetup.dll Execution
|
||||
execution,T1085,6,Rundll32 setupapi.dll Execution
|
||||
execution,T1053,1,At.exe Scheduled task
|
||||
execution,T1053,2,Scheduled task Local
|
||||
execution,T1053,3,Scheduled task Remote
|
||||
execution,T1053,4,Powershell Cmdlet Scheduled Task
|
||||
execution,T1064,2,Create and Execute Batch Script
|
||||
execution,T1035,1,Execute a Command as a Service
|
||||
execution,T1035,2,Use PsExec to execute a command on a remote host
|
||||
execution,T1218,1,mavinject - Inject DLL into running process
|
||||
execution,T1218,2,SyncAppvPublishingServer - Execute arbitrary PowerShell code
|
||||
execution,T1218,3,Register-CimProvider - Execute evil dll
|
||||
execution,T1218,4,Msiexec.exe - Execute Local MSI file
|
||||
execution,T1218,5,Msiexec.exe - Execute Remote MSI file
|
||||
execution,T1218,6,Msiexec.exe - Execute Arbitrary DLL
|
||||
execution,T1218,7,Odbcconf.exe - Execute Arbitrary DLL
|
||||
execution,T1218,8,InfDefaultInstall.exe .inf Execution
|
||||
execution,T1216,1,PubPrn.vbs Signed Script Bypass
|
||||
execution,T1216,2,SyncAppvPublishingServer Signed Script PowerShell Command Execution
|
||||
execution,T1216,3,manage-bde.wsf Signed Script Command Execution
|
||||
execution,T1127,1,MSBuild Bypass Using Inline Tasks
|
||||
execution,T1204,1,OSTap Style Macro Execution
|
||||
execution,T1204,2,Maldoc choice flags command execution
|
||||
execution,T1204,3,OSTAP JS version
|
||||
execution,T1047,1,WMI Reconnaissance Users
|
||||
execution,T1047,2,WMI Reconnaissance Processes
|
||||
execution,T1047,3,WMI Reconnaissance Software
|
||||
execution,T1047,4,WMI Reconnaissance List Remote Services
|
||||
execution,T1047,5,WMI Execute Local Process
|
||||
execution,T1047,6,WMI Execute Remote Process
|
||||
execution,T1028,1,Enable Windows Remote Management
|
||||
execution,T1028,2,PowerShell Lateral Movement
|
||||
execution,T1028,3,WMIC Process Call Create
|
||||
execution,T1028,4,Psexec
|
||||
execution,T1028,5,Invoke-Command
|
||||
execution,T1220,1,MSXSL Bypass using local files
|
||||
execution,T1220,2,MSXSL Bypass using remote files
|
||||
execution,T1220,3,WMIC bypass using local XSL file
|
||||
execution,T1220,4,WMIC bypass using remote XSL file
|
||||
command-and-control,T1090,2,portproxy reg key
|
||||
command-and-control,T1219,1,TeamViewer Files Detected Test on Windows
|
||||
command-and-control,T1105,7,certutil download (urlcache)
|
||||
command-and-control,T1105,8,certutil download (verifyctl)
|
||||
command-and-control,T1105,9,Windows - BITSAdmin BITS Download
|
||||
command-and-control,T1105,10,Windows - PowerShell Download
|
||||
command-and-control,T1105,11,OSTAP Worming Activity
|
||||
command-and-control,T1071,1,Malicious User Agents - Powershell
|
||||
command-and-control,T1071,2,Malicious User Agents - CMD
|
||||
command-and-control,T1071,4,DNS Large Query Volume
|
||||
command-and-control,T1071,5,DNS Regular Beaconing
|
||||
command-and-control,T1071,6,DNS Long Domain Query
|
||||
command-and-control,T1071,7,DNS C2
|
||||
command-and-control,T1071,8,OSTap Payload Download
|
||||
command-and-control,T1032,1,OpenSSL C2
|
||||
command-and-control,T1095,1,ICMP C2
|
||||
command-and-control,T1095,2,Netcat C2
|
||||
command-and-control,T1095,3,Powercat C2
|
||||
command-and-control,T1065,1,Testing usage of uncommonly used port with PowerShell
|
||||
command-and-control,T1102,1,Reach out to C2 Pointer URLs via command_prompt
|
||||
command-and-control,T1102,2,Reach out to C2 Pointer URLs via powershell
|
||||
initial-access,T1193,1,Download Phishing Attachment - VBScript
|
||||
|
@@ -0,0 +1,1020 @@
|
||||
# All Atomic Tests by ATT&CK Tactic & Technique
|
||||
# persistence
|
||||
- [T1156 .bash_profile and .bashrc](./T1156/T1156.md)
|
||||
- Atomic Test #1: Add command to .bash_profile [macos, linux]
|
||||
- Atomic Test #2: Add command to .bashrc [macos, linux]
|
||||
- [T1015 Accessibility Features](./T1015/T1015.md)
|
||||
- Atomic Test #1: Attaches Command Prompt as a Debugger to a List of Target Processes [windows]
|
||||
- [T1098 Account Manipulation](./T1098/T1098.md)
|
||||
- Atomic Test #1: Admin Account Manipulate [windows]
|
||||
- T1182 AppCert DLLs [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1103 AppInit DLLs](./T1103/T1103.md)
|
||||
- Atomic Test #1: Install AppInit Shim [windows]
|
||||
- [T1138 Application Shimming](./T1138/T1138.md)
|
||||
- Atomic Test #1: Application Shim Installation [windows]
|
||||
- Atomic Test #2: New shim database files created in the default shim database directory [windows]
|
||||
- Atomic Test #3: Registry key creation and/or modification events for SDB [windows]
|
||||
- T1131 Authentication Package [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1197 BITS Jobs](./T1197/T1197.md)
|
||||
- Atomic Test #1: Bitsadmin Download (cmd) [windows]
|
||||
- Atomic Test #2: Bitsadmin Download (PowerShell) [windows]
|
||||
- Atomic Test #3: Persist, Download, & Execute [windows]
|
||||
- T1067 Bootkit [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1176 Browser Extensions](./T1176/T1176.md)
|
||||
- Atomic Test #1: Chrome (Developer Mode) [linux, windows, macos]
|
||||
- Atomic Test #2: Chrome (Chrome Web Store) [linux, windows, macos]
|
||||
- Atomic Test #3: Firefox [linux, windows, macos]
|
||||
- [T1042 Change Default File Association](./T1042/T1042.md)
|
||||
- Atomic Test #1: Change Default File Association [windows]
|
||||
- T1109 Component Firmware [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1122 Component Object Model Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1136 Create Account](./T1136/T1136.md)
|
||||
- Atomic Test #1: Create a user account on a Linux system [linux]
|
||||
- Atomic Test #2: Create a user account on a MacOS system [macos]
|
||||
- Atomic Test #3: Create a new user in a command prompt [windows]
|
||||
- Atomic Test #4: Create a new user in PowerShell [windows]
|
||||
- Atomic Test #5: Create a new user in Linux with `root` UID and GID. [linux]
|
||||
- [T1038 DLL Search Order Hijacking](./T1038/T1038.md)
|
||||
- Atomic Test #1: DLL Search Order Hijacking - amsi.dll [windows]
|
||||
- T1157 Dylib Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1519 Emond](./T1519/T1519.md)
|
||||
- Atomic Test #1: Persistance with Event Monitor - emond [macos]
|
||||
- T1133 External Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1044 File System Permissions Weakness](./T1044/T1044.md)
|
||||
- Atomic Test #1: File System Permissions Weakness [windows]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
|
||||
- Atomic Test #2: Mac Hidden file [macos]
|
||||
- Atomic Test #3: Create Windows System File with Attrib [windows]
|
||||
- Atomic Test #4: Create Windows Hidden File with Attrib [windows]
|
||||
- Atomic Test #5: Hidden files [macos]
|
||||
- Atomic Test #6: Hide a Directory [macos]
|
||||
- Atomic Test #7: Show all hidden files [macos]
|
||||
- Atomic Test #8: Create ADS command prompt [windows]
|
||||
- Atomic Test #9: Create ADS PowerShell [windows]
|
||||
- [T1179 Hooking](./T1179/T1179.md)
|
||||
- Atomic Test #1: Hook PowerShell TLS Encrypt/Decrypt Messages [windows]
|
||||
- [T1062 Hypervisor](./T1062/T1062.md)
|
||||
- Atomic Test #1: Installing Hyper-V Feature [windows]
|
||||
- [T1183 Image File Execution Options Injection](./T1183/T1183.md)
|
||||
- Atomic Test #1: IFEO Add Debugger [windows]
|
||||
- Atomic Test #2: IFEO Global Flags [windows]
|
||||
- T1525 Implant Container Image [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1215 Kernel Modules and Extensions](./T1215/T1215.md)
|
||||
- Atomic Test #1: Linux - Load Kernel Module via insmod [linux]
|
||||
- T1161 LC_LOAD_DYLIB Addition [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1177 LSASS Driver [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1159 Launch Agent](./T1159/T1159.md)
|
||||
- Atomic Test #1: Launch Agent [macos]
|
||||
- [T1160 Launch Daemon](./T1160/T1160.md)
|
||||
- Atomic Test #1: Launch Daemon [macos]
|
||||
- [T1152 Launchctl](./T1152/T1152.md)
|
||||
- Atomic Test #1: Launchctl [macos]
|
||||
- [T1168 Local Job Scheduling](./T1168/T1168.md)
|
||||
- Atomic Test #1: Cron - Replace crontab with referenced file [macos, linux]
|
||||
- Atomic Test #2: Cron - Add script to cron folder [macos, linux]
|
||||
- Atomic Test #3: Event Monitor Daemon Persistence [macos, linux]
|
||||
- T1162 Login Item [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1037 Logon Scripts](./T1037/T1037.md)
|
||||
- Atomic Test #1: Logon Scripts [windows]
|
||||
- Atomic Test #2: Scheduled Task Startup Script [windows]
|
||||
- Atomic Test #3: Logon Scripts - Mac [macos]
|
||||
- Atomic Test #4: Supicious vbs file run from startup Folder [windows]
|
||||
- Atomic Test #5: Supicious jse file run from startup Folder [windows]
|
||||
- Atomic Test #6: Supicious bat file run from startup Folder [windows]
|
||||
- [T1031 Modify Existing Service](./T1031/T1031.md)
|
||||
- Atomic Test #1: Modify Fax service to run PowerShell [windows]
|
||||
- [T1128 Netsh Helper DLL](./T1128/T1128.md)
|
||||
- Atomic Test #1: Netsh Helper DLL Registration [windows]
|
||||
- [T1050 New Service](./T1050/T1050.md)
|
||||
- Atomic Test #1: Service Installation [windows]
|
||||
- Atomic Test #2: Service Installation PowerShell [windows]
|
||||
- [T1137 Office Application Startup](./T1137/T1137.md)
|
||||
- Atomic Test #1: DDEAUTO [windows]
|
||||
- T1034 Path Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1150 Plist Modification](./T1150/T1150.md)
|
||||
- Atomic Test #1: Plist Modification [macos]
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1013 Port Monitors [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1504 PowerShell Profile](./T1504/T1504.md)
|
||||
- Atomic Test #1: Append malicious start-process cmdlet [windows]
|
||||
- [T1163 Rc.common](./T1163/T1163.md)
|
||||
- Atomic Test #1: rc.common [macos]
|
||||
- [T1164 Re-opened Applications](./T1164/T1164.md)
|
||||
- Atomic Test #1: Re-Opened Applications [macos]
|
||||
- Atomic Test #2: Re-Opened Applications [macos]
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1060 Registry Run Keys / Startup Folder](./T1060/T1060.md)
|
||||
- Atomic Test #1: Reg Key Run [windows]
|
||||
- Atomic Test #2: Reg Key RunOnce [windows]
|
||||
- Atomic Test #3: PowerShell Registry RunOnce [windows]
|
||||
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1053 Scheduled Task](./T1053/T1053.md)
|
||||
- Atomic Test #1: At.exe Scheduled task [windows]
|
||||
- Atomic Test #2: Scheduled task Local [windows]
|
||||
- Atomic Test #3: Scheduled task Remote [windows]
|
||||
- Atomic Test #4: Powershell Cmdlet Scheduled Task [windows]
|
||||
- [T1180 Screensaver](./T1180/T1180.md)
|
||||
- Atomic Test #1: Set Arbitrary Binary as Screensaver [windows]
|
||||
- [T1101 Security Support Provider](./T1101/T1101.md)
|
||||
- Atomic Test #1: Modify SSP configuration in registry [windows]
|
||||
- [T1505 Server Software Component](./T1505/T1505.md)
|
||||
- Atomic Test #1: Install MS Exchange Transport Agent Persistence [windows]
|
||||
- [T1058 Service Registry Permissions Weakness](./T1058/T1058.md)
|
||||
- Atomic Test #1: Service Registry Permissions Weakness [windows]
|
||||
- [T1166 Setuid and Setgid](./T1166/T1166.md)
|
||||
- Atomic Test #1: Make and modify binary from C source [macos, linux]
|
||||
- Atomic Test #2: Set a SetUID flag on file [macos, linux]
|
||||
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
|
||||
- [T1023 Shortcut Modification](./T1023/T1023.md)
|
||||
- Atomic Test #1: Shortcut Modification [windows]
|
||||
- Atomic Test #2: Create shortcut to cmd in startup folders [windows]
|
||||
- [T1165 Startup Items](./T1165/T1165.md)
|
||||
- Atomic Test #1: add file to Local Library StartupItems [macos]
|
||||
- T1019 System Firmware [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1501 Systemd Service](./T1501/T1501.md)
|
||||
- Atomic Test #1: Create Systemd Service [linux]
|
||||
- T1209 Time Providers [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1154 Trap](./T1154/T1154.md)
|
||||
- Atomic Test #1: Trap [macos, linux]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
- Atomic Test #1: Web Shell Written to Disk [windows]
|
||||
- [T1084 Windows Management Instrumentation Event Subscription](./T1084/T1084.md)
|
||||
- Atomic Test #1: Persistence [windows]
|
||||
- [T1004 Winlogon Helper DLL](./T1004/T1004.md)
|
||||
- Atomic Test #1: Winlogon Shell Key Persistence - PowerShell [windows]
|
||||
- Atomic Test #2: Winlogon Userinit Key Persistence - PowerShell [windows]
|
||||
- Atomic Test #3: Winlogon Notify Key Logon Persistence - PowerShell [windows]
|
||||
|
||||
# defense-evasion
|
||||
- T1134 Access Token Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1527 Application Access Token [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1197 BITS Jobs](./T1197/T1197.md)
|
||||
- Atomic Test #1: Bitsadmin Download (cmd) [windows]
|
||||
- Atomic Test #2: Bitsadmin Download (PowerShell) [windows]
|
||||
- Atomic Test #3: Persist, Download, & Execute [windows]
|
||||
- [T1009 Binary Padding](./T1009/T1009.md)
|
||||
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [macos, linux]
|
||||
- [T1088 Bypass User Account Control](./T1088/T1088.md)
|
||||
- Atomic Test #1: Bypass UAC using Event Viewer (cmd) [windows]
|
||||
- Atomic Test #2: Bypass UAC using Event Viewer (PowerShell) [windows]
|
||||
- Atomic Test #3: Bypass UAC using Fodhelper [windows]
|
||||
- Atomic Test #4: Bypass UAC using Fodhelper - PowerShell [windows]
|
||||
- Atomic Test #5: Bypass UAC using ComputerDefaults (PowerShell) [windows]
|
||||
- Atomic Test #6: Bypass UAC by Mocking Trusted Directories [windows]
|
||||
- [T1191 CMSTP](./T1191/T1191.md)
|
||||
- Atomic Test #1: CMSTP Executing Remote Scriptlet [windows]
|
||||
- Atomic Test #2: CMSTP Executing UAC Bypass [windows]
|
||||
- [T1146 Clear Command History](./T1146/T1146.md)
|
||||
- Atomic Test #1: Clear Bash history (rm) [linux, macos]
|
||||
- Atomic Test #2: Clear Bash history (echo) [linux, macos]
|
||||
- Atomic Test #3: Clear Bash history (cat dev/null) [linux, macos]
|
||||
- Atomic Test #4: Clear Bash history (ln dev/null) [linux, macos]
|
||||
- Atomic Test #5: Clear Bash history (truncate) [linux]
|
||||
- Atomic Test #6: Clear history of a bunch of shells [linux, macos]
|
||||
- T1116 Code Signing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1500 Compile After Delivery](./T1500/T1500.md)
|
||||
- Atomic Test #1: Compile After Delivery using csc.exe [windows]
|
||||
- [T1223 Compiled HTML File](./T1223/T1223.md)
|
||||
- Atomic Test #1: Compiled HTML Help Local Payload [windows]
|
||||
- Atomic Test #2: Compiled HTML Help Remote Payload [windows]
|
||||
- T1109 Component Firmware [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1122 Component Object Model Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #1: Connection Proxy [macos, linux]
|
||||
- Atomic Test #2: portproxy reg key [windows]
|
||||
- [T1196 Control Panel Items](./T1196/T1196.md)
|
||||
- Atomic Test #1: Control Panel Items [windows]
|
||||
- [T1207 DCShadow](./T1207/T1207.md)
|
||||
- Atomic Test #1: DCShadow - Mimikatz [windows]
|
||||
- [T1038 DLL Search Order Hijacking](./T1038/T1038.md)
|
||||
- Atomic Test #1: DLL Search Order Hijacking - amsi.dll [windows]
|
||||
- [T1073 DLL Side-Loading](./T1073/T1073.md)
|
||||
- Atomic Test #1: DLL Side-Loading using the Notepad++ GUP.exe binary [windows]
|
||||
- [T1140 Deobfuscate/Decode Files or Information](./T1140/T1140.md)
|
||||
- Atomic Test #1: Deobfuscate/Decode Files Or Information [windows]
|
||||
- Atomic Test #2: Certutil Rename and Decode [windows]
|
||||
- [T1089 Disabling Security Tools](./T1089/T1089.md)
|
||||
- Atomic Test #1: Disable iptables firewall [linux]
|
||||
- Atomic Test #2: Disable syslog [linux]
|
||||
- Atomic Test #3: Disable Cb Response [linux]
|
||||
- Atomic Test #4: Disable SELinux [linux]
|
||||
- Atomic Test #5: Disable Carbon Black Response [macos]
|
||||
- Atomic Test #6: Disable LittleSnitch [macos]
|
||||
- Atomic Test #7: Disable OpenDNS Umbrella [macos]
|
||||
- Atomic Test #8: Unload Sysmon Filter Driver [windows]
|
||||
- Atomic Test #9: Disable Windows IIS HTTP Logging [windows]
|
||||
- Atomic Test #10: Uninstall Sysmon [windows]
|
||||
- Atomic Test #11: AMSI Bypass - AMSI InitFailed [windows]
|
||||
- Atomic Test #12: AMSI Bypass - Remove AMSI Provider Reg Key [windows]
|
||||
- Atomic Test #13: Disable Arbitrary Security Windows Service [windows]
|
||||
- Atomic Test #14: Disable PowerShell Script Block Logging [windows]
|
||||
- Atomic Test #15: PowerShell Bypass of AntiMalware Scripting Interface [windows]
|
||||
- Atomic Test #16: Tamper with Windows Defender ATP PowerShell [windows]
|
||||
- Atomic Test #17: Tamper with Windows Defender Command Prompt [windows]
|
||||
- Atomic Test #18: Tamper with Windows Defender Registry [windows]
|
||||
- Atomic Test #19: Disable Microft Office Security Features [windows]
|
||||
- Atomic Test #20: Remove Windows Defender Definition Files [windows]
|
||||
- T1480 Execution Guardrails [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1181 Extra Window Memory Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1107 File Deletion](./T1107/T1107.md)
|
||||
- Atomic Test #1: Delete a single file - Linux/macOS [linux, macos]
|
||||
- Atomic Test #2: Delete an entire folder - Linux/macOS [linux, macos]
|
||||
- Atomic Test #3: Overwrite and delete a file with shred [linux]
|
||||
- Atomic Test #4: Delete a single file - Windows cmd [windows]
|
||||
- Atomic Test #5: Delete an entire folder - Windows cmd [windows]
|
||||
- Atomic Test #6: Delete a single file - Windows PowerShell [windows]
|
||||
- Atomic Test #7: Delete an entire folder - Windows PowerShell [windows]
|
||||
- Atomic Test #8: Delete VSS - vssadmin [windows]
|
||||
- Atomic Test #9: Delete VSS - wmic [windows]
|
||||
- Atomic Test #10: bcdedit [windows]
|
||||
- Atomic Test #11: wbadmin [windows]
|
||||
- Atomic Test #12: Delete Filesystem - Linux [linux]
|
||||
- Atomic Test #13: Delete-PrefetchFile [windows]
|
||||
- Atomic Test #14: Delete TeamViewer Log Files [windows, macos]
|
||||
- T1006 File System Logical Offsets [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1222 File and Directory Permissions Modification](./T1222/T1222.md)
|
||||
- Atomic Test #1: Take ownership using takeown utility [windows]
|
||||
- Atomic Test #2: Take ownership recursively using takeown utility [windows]
|
||||
- Atomic Test #3: cacls - Grant permission to specified user or group [windows]
|
||||
- Atomic Test #4: cacls - Grant permission to specified user or group recursively [windows]
|
||||
- Atomic Test #5: icacls - Grant permission to specified user or group [windows]
|
||||
- Atomic Test #6: icacls - Grant permission to specified user or group recursively [windows]
|
||||
- Atomic Test #7: attrib - Remove read-only attribute [windows]
|
||||
- Atomic Test #8: chmod - Change file or folder mode (numeric mode) [macos, linux]
|
||||
- Atomic Test #9: chmod - Change file or folder mode (symbolic mode) [macos, linux]
|
||||
- Atomic Test #10: chmod - Change file or folder mode (numeric mode) recursively [macos, linux]
|
||||
- Atomic Test #11: chmod - Change file or folder mode (symbolic mode) recursively [macos, linux]
|
||||
- Atomic Test #12: chown - Change file or folder ownership and group [macos, linux]
|
||||
- Atomic Test #13: chown - Change file or folder ownership and group recursively [macos, linux]
|
||||
- Atomic Test #14: chown - Change file or folder mode ownership only [macos, linux]
|
||||
- Atomic Test #15: chown - Change file or folder ownership recursively [macos, linux]
|
||||
- Atomic Test #16: chattr - Remove immutable file attribute [macos, linux]
|
||||
- [T1144 Gatekeeper Bypass](./T1144/T1144.md)
|
||||
- Atomic Test #1: Gatekeeper Bypass [macos]
|
||||
- T1484 Group Policy Modification [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1148 HISTCONTROL](./T1148/T1148.md)
|
||||
- Atomic Test #1: Disable history collection [linux, macos]
|
||||
- Atomic Test #2: Mac HISTCONTROL [macos, linux]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
|
||||
- Atomic Test #2: Mac Hidden file [macos]
|
||||
- Atomic Test #3: Create Windows System File with Attrib [windows]
|
||||
- Atomic Test #4: Create Windows Hidden File with Attrib [windows]
|
||||
- Atomic Test #5: Hidden files [macos]
|
||||
- Atomic Test #6: Hide a Directory [macos]
|
||||
- Atomic Test #7: Show all hidden files [macos]
|
||||
- Atomic Test #8: Create ADS command prompt [windows]
|
||||
- Atomic Test #9: Create ADS PowerShell [windows]
|
||||
- [T1147 Hidden Users](./T1147/T1147.md)
|
||||
- Atomic Test #1: Hidden Users [macos]
|
||||
- [T1143 Hidden Window](./T1143/T1143.md)
|
||||
- Atomic Test #1: Hidden Window [windows]
|
||||
- [T1183 Image File Execution Options Injection](./T1183/T1183.md)
|
||||
- Atomic Test #1: IFEO Add Debugger [windows]
|
||||
- Atomic Test #2: IFEO Global Flags [windows]
|
||||
- T1054 Indicator Blocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1066 Indicator Removal from Tools [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1070 Indicator Removal on Host](./T1070/T1070.md)
|
||||
- Atomic Test #1: Clear Logs [windows]
|
||||
- Atomic Test #2: FSUtil [windows]
|
||||
- Atomic Test #3: rm -rf [macos, linux]
|
||||
- Atomic Test #4: Overwrite Linux Mail Spool [linux]
|
||||
- Atomic Test #5: Overwrite Linux Log [linux]
|
||||
- Atomic Test #6: Delete System Logs Using PowerShell [windows]
|
||||
- Atomic Test #7: Delete System Logs Using Clear-EventLogId [windows]
|
||||
- [T1202 Indirect Command Execution](./T1202/T1202.md)
|
||||
- Atomic Test #1: Indirect Command Execution - pcalua.exe [windows]
|
||||
- Atomic Test #2: Indirect Command Execution - forfiles.exe [windows]
|
||||
- [T1130 Install Root Certificate](./T1130/T1130.md)
|
||||
- Atomic Test #1: Install root CA on CentOS/RHEL [linux]
|
||||
- [T1118 InstallUtil](./T1118/T1118.md)
|
||||
- Atomic Test #1: CheckIfInstallable method call [windows]
|
||||
- Atomic Test #2: InstallHelper method call [windows]
|
||||
- Atomic Test #3: InstallUtil class constructor method call [windows]
|
||||
- Atomic Test #4: InstallUtil Install method call [windows]
|
||||
- Atomic Test #5: InstallUtil Uninstall method call - /U variant [windows]
|
||||
- Atomic Test #6: InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant [windows]
|
||||
- Atomic Test #7: InstallUtil HelpText method call [windows]
|
||||
- Atomic Test #8: InstallUtil evasive invocation [windows]
|
||||
- T1149 LC_MAIN Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1152 Launchctl](./T1152/T1152.md)
|
||||
- Atomic Test #1: Launchctl [macos]
|
||||
- [T1036 Masquerading](./T1036/T1036.md)
|
||||
- Atomic Test #1: Masquerading as Windows LSASS process [windows]
|
||||
- Atomic Test #2: Masquerading as Linux crond process. [linux]
|
||||
- Atomic Test #3: Masquerading - cscript.exe running as notepad.exe [windows]
|
||||
- Atomic Test #4: Masquerading - wscript.exe running as svchost.exe [windows]
|
||||
- Atomic Test #5: Masquerading - powershell.exe running as taskhostw.exe [windows]
|
||||
- Atomic Test #6: Masquerading - non-windows exe running as windows exe [windows]
|
||||
- Atomic Test #7: Masquerading - windows exe running as different windows exe [windows]
|
||||
- Atomic Test #8: Malicious process Masquerading as LSM.exe [windows]
|
||||
- [T1112 Modify Registry](./T1112/T1112.md)
|
||||
- Atomic Test #1: Modify Registry of Current User Profile - cmd [windows]
|
||||
- Atomic Test #2: Modify Registry of Local Machine - cmd [windows]
|
||||
- Atomic Test #3: Modify Registry of Another User Profile [windows]
|
||||
- Atomic Test #4: Modify registry to store logon credentials [windows]
|
||||
- Atomic Test #5: Modify registry to store PowerShell code [windows]
|
||||
- Atomic Test #6: Add domain to Trusted sites Zone [windows]
|
||||
- Atomic Test #7: Javascript in registry [windows]
|
||||
- [T1170 Mshta](./T1170/T1170.md)
|
||||
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Mshta calls a local VBScript file to launch notepad.exe [windows]
|
||||
- Atomic Test #3: Mshta executes VBScript to execute malicious command [windows]
|
||||
- Atomic Test #4: Mshta Executes Remote HTML Application (HTA) [windows]
|
||||
- [T1096 NTFS File Attributes](./T1096/T1096.md)
|
||||
- Atomic Test #1: Alternate Data Streams (ADS) [windows]
|
||||
- Atomic Test #2: Store file in Alternate Data Stream (ADS) [windows]
|
||||
- [T1126 Network Share Connection Removal](./T1126/T1126.md)
|
||||
- Atomic Test #1: Add Network Share [windows]
|
||||
- Atomic Test #2: Remove Network Share [windows]
|
||||
- Atomic Test #3: Remove Network Share PowerShell [windows]
|
||||
- [T1027 Obfuscated Files or Information](./T1027/T1027.md)
|
||||
- Atomic Test #1: Decode base64 Data into Script [macos, linux]
|
||||
- Atomic Test #2: Execute base64-encoded PowerShell [windows]
|
||||
- Atomic Test #3: Execute base64-encoded PowerShell from Windows Registry [windows]
|
||||
- [T1502 Parent PID Spoofing](./T1502/T1502.md)
|
||||
- Atomic Test #1: Parent PID Spoofing using PowerShell [windows]
|
||||
- [T1150 Plist Modification](./T1150/T1150.md)
|
||||
- Atomic Test #1: Plist Modification [macos]
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1186 Process Doppelgänging [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1093 Process Hollowing](./T1093/T1093.md)
|
||||
- Atomic Test #1: Process Hollowing using PowerShell [windows]
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- Atomic Test #1: Process Injection via mavinject.exe [windows]
|
||||
- Atomic Test #2: Shared Library Injection via /etc/ld.so.preload [linux]
|
||||
- Atomic Test #3: Shared Library Injection via LD_PRELOAD [linux]
|
||||
- Atomic Test #4: Process Injection via C# [windows]
|
||||
- Atomic Test #5: svchost writing a file to a UNC path [windows]
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1121 Regsvcs/Regasm](./T1121/T1121.md)
|
||||
- Atomic Test #1: Regasm Uninstall Method Call Test [windows]
|
||||
- Atomic Test #2: Regsvs Uninstall Method Call Test [windows]
|
||||
- [T1117 Regsvr32](./T1117/T1117.md)
|
||||
- Atomic Test #1: Regsvr32 local COM scriptlet execution [windows]
|
||||
- Atomic Test #2: Regsvr32 remote COM scriptlet execution [windows]
|
||||
- Atomic Test #3: Regsvr32 local DLL execution [windows]
|
||||
- T1536 Revert Cloud Instance [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1014 Rootkit](./T1014/T1014.md)
|
||||
- Atomic Test #1: Loadable Kernel Module based Rootkit [linux]
|
||||
- Atomic Test #2: Loadable Kernel Module based Rootkit [linux]
|
||||
- Atomic Test #3: Windows Signed Driver Rootkit Test [windows]
|
||||
- [T1085 Rundll32](./T1085/T1085.md)
|
||||
- Atomic Test #1: Rundll32 execute JavaScript Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Rundll32 execute VBscript command [windows]
|
||||
- Atomic Test #3: Rundll32 advpack.dll Execution [windows]
|
||||
- Atomic Test #4: Rundll32 ieadvpack.dll Execution [windows]
|
||||
- Atomic Test #5: Rundll32 syssetup.dll Execution [windows]
|
||||
- Atomic Test #6: Rundll32 setupapi.dll Execution [windows]
|
||||
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #1: Create and Execute Bash Shell Script [macos, linux]
|
||||
- Atomic Test #2: Create and Execute Batch Script [windows]
|
||||
- [T1218 Signed Binary Proxy Execution](./T1218/T1218.md)
|
||||
- Atomic Test #1: mavinject - Inject DLL into running process [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer - Execute arbitrary PowerShell code [windows]
|
||||
- Atomic Test #3: Register-CimProvider - Execute evil dll [windows]
|
||||
- Atomic Test #4: Msiexec.exe - Execute Local MSI file [windows]
|
||||
- Atomic Test #5: Msiexec.exe - Execute Remote MSI file [windows]
|
||||
- Atomic Test #6: Msiexec.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #7: Odbcconf.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #8: InfDefaultInstall.exe .inf Execution [windows]
|
||||
- [T1216 Signed Script Proxy Execution](./T1216/T1216.md)
|
||||
- Atomic Test #1: PubPrn.vbs Signed Script Bypass [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer Signed Script PowerShell Command Execution [windows]
|
||||
- Atomic Test #3: manage-bde.wsf Signed Script Command Execution [windows]
|
||||
- T1045 Software Packing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1151 Space after Filename](./T1151/T1151.md)
|
||||
- Atomic Test #1: Space After Filename [macos]
|
||||
- T1221 Template Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1099 Timestomp](./T1099/T1099.md)
|
||||
- Atomic Test #1: Set a file's access timestamp [linux, macos]
|
||||
- Atomic Test #2: Set a file's modification timestamp [linux, macos]
|
||||
- Atomic Test #3: Set a file's creation timestamp [linux, macos]
|
||||
- Atomic Test #4: Modify file timestamps using reference file [linux, macos]
|
||||
- Atomic Test #5: Windows - Modify file creation timestamp with PowerShell [windows]
|
||||
- Atomic Test #6: Windows - Modify file last modified timestamp with PowerShell [windows]
|
||||
- Atomic Test #7: Windows - Modify file last access timestamp with PowerShell [windows]
|
||||
- [T1127 Trusted Developer Utilities](./T1127/T1127.md)
|
||||
- Atomic Test #1: MSBuild Bypass Using Inline Tasks [windows]
|
||||
- T1535 Unused/Unsupported Cloud Regions [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
- Atomic Test #1: Reach out to C2 Pointer URLs via command_prompt [windows]
|
||||
- Atomic Test #2: Reach out to C2 Pointer URLs via powershell [windows]
|
||||
- T1506 Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1220 XSL Script Processing](./T1220/T1220.md)
|
||||
- Atomic Test #1: MSXSL Bypass using local files [windows]
|
||||
- Atomic Test #2: MSXSL Bypass using remote files [windows]
|
||||
- Atomic Test #3: WMIC bypass using local XSL file [windows]
|
||||
- Atomic Test #4: WMIC bypass using remote XSL file [windows]
|
||||
|
||||
# privilege-escalation
|
||||
- T1134 Access Token Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1015 Accessibility Features](./T1015/T1015.md)
|
||||
- Atomic Test #1: Attaches Command Prompt as a Debugger to a List of Target Processes [windows]
|
||||
- T1182 AppCert DLLs [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1103 AppInit DLLs](./T1103/T1103.md)
|
||||
- Atomic Test #1: Install AppInit Shim [windows]
|
||||
- [T1138 Application Shimming](./T1138/T1138.md)
|
||||
- Atomic Test #1: Application Shim Installation [windows]
|
||||
- Atomic Test #2: New shim database files created in the default shim database directory [windows]
|
||||
- Atomic Test #3: Registry key creation and/or modification events for SDB [windows]
|
||||
- [T1088 Bypass User Account Control](./T1088/T1088.md)
|
||||
- Atomic Test #1: Bypass UAC using Event Viewer (cmd) [windows]
|
||||
- Atomic Test #2: Bypass UAC using Event Viewer (PowerShell) [windows]
|
||||
- Atomic Test #3: Bypass UAC using Fodhelper [windows]
|
||||
- Atomic Test #4: Bypass UAC using Fodhelper - PowerShell [windows]
|
||||
- Atomic Test #5: Bypass UAC using ComputerDefaults (PowerShell) [windows]
|
||||
- Atomic Test #6: Bypass UAC by Mocking Trusted Directories [windows]
|
||||
- [T1038 DLL Search Order Hijacking](./T1038/T1038.md)
|
||||
- Atomic Test #1: DLL Search Order Hijacking - amsi.dll [windows]
|
||||
- T1157 Dylib Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1514 Elevated Execution with Prompt [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1519 Emond](./T1519/T1519.md)
|
||||
- Atomic Test #1: Persistance with Event Monitor - emond [macos]
|
||||
- T1068 Exploitation for Privilege Escalation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1181 Extra Window Memory Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1044 File System Permissions Weakness](./T1044/T1044.md)
|
||||
- Atomic Test #1: File System Permissions Weakness [windows]
|
||||
- [T1179 Hooking](./T1179/T1179.md)
|
||||
- Atomic Test #1: Hook PowerShell TLS Encrypt/Decrypt Messages [windows]
|
||||
- [T1183 Image File Execution Options Injection](./T1183/T1183.md)
|
||||
- Atomic Test #1: IFEO Add Debugger [windows]
|
||||
- Atomic Test #2: IFEO Global Flags [windows]
|
||||
- [T1160 Launch Daemon](./T1160/T1160.md)
|
||||
- Atomic Test #1: Launch Daemon [macos]
|
||||
- [T1050 New Service](./T1050/T1050.md)
|
||||
- Atomic Test #1: Service Installation [windows]
|
||||
- Atomic Test #2: Service Installation PowerShell [windows]
|
||||
- [T1502 Parent PID Spoofing](./T1502/T1502.md)
|
||||
- Atomic Test #1: Parent PID Spoofing using PowerShell [windows]
|
||||
- T1034 Path Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1150 Plist Modification](./T1150/T1150.md)
|
||||
- Atomic Test #1: Plist Modification [macos]
|
||||
- T1013 Port Monitors [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1504 PowerShell Profile](./T1504/T1504.md)
|
||||
- Atomic Test #1: Append malicious start-process cmdlet [windows]
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- Atomic Test #1: Process Injection via mavinject.exe [windows]
|
||||
- Atomic Test #2: Shared Library Injection via /etc/ld.so.preload [linux]
|
||||
- Atomic Test #3: Shared Library Injection via LD_PRELOAD [linux]
|
||||
- Atomic Test #4: Process Injection via C# [windows]
|
||||
- Atomic Test #5: svchost writing a file to a UNC path [windows]
|
||||
- T1178 SID-History Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1053 Scheduled Task](./T1053/T1053.md)
|
||||
- Atomic Test #1: At.exe Scheduled task [windows]
|
||||
- Atomic Test #2: Scheduled task Local [windows]
|
||||
- Atomic Test #3: Scheduled task Remote [windows]
|
||||
- Atomic Test #4: Powershell Cmdlet Scheduled Task [windows]
|
||||
- [T1058 Service Registry Permissions Weakness](./T1058/T1058.md)
|
||||
- Atomic Test #1: Service Registry Permissions Weakness [windows]
|
||||
- [T1166 Setuid and Setgid](./T1166/T1166.md)
|
||||
- Atomic Test #1: Make and modify binary from C source [macos, linux]
|
||||
- Atomic Test #2: Set a SetUID flag on file [macos, linux]
|
||||
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
|
||||
- [T1165 Startup Items](./T1165/T1165.md)
|
||||
- Atomic Test #1: add file to Local Library StartupItems [macos]
|
||||
- [T1169 Sudo](./T1169/T1169.md)
|
||||
- Atomic Test #1: Sudo usage [macos, linux]
|
||||
- [T1206 Sudo Caching](./T1206/T1206.md)
|
||||
- Atomic Test #1: Unlimited sudo cache timeout [macos, linux]
|
||||
- Atomic Test #2: Disable tty_tickets for sudo caching [macos, linux]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
- Atomic Test #1: Web Shell Written to Disk [windows]
|
||||
|
||||
# impact
|
||||
- [T1531 Account Access Removal](./T1531/T1531.md)
|
||||
- Atomic Test #1: Change User Password - Windows [windows]
|
||||
- Atomic Test #2: Delete User - Windows [windows]
|
||||
- [T1485 Data Destruction](./T1485/T1485.md)
|
||||
- Atomic Test #1: Windows - Delete Volume Shadow Copies [windows]
|
||||
- Atomic Test #2: Windows - Delete Windows Backup Catalog [windows]
|
||||
- Atomic Test #3: Windows - Disable Windows Recovery Console Repair [windows]
|
||||
- Atomic Test #4: Windows - Overwrite file with Sysinternals SDelete [windows]
|
||||
- Atomic Test #5: macOS/Linux - Overwrite file with DD [linux, macos]
|
||||
- Atomic Test #6: Windows - Delete Backup Files [windows]
|
||||
- T1486 Data Encrypted for Impact [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1491 Defacement [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1488 Disk Content Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1487 Disk Structure Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1499 Endpoint Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1495 Firmware Corruption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1490 Inhibit System Recovery](./T1490/T1490.md)
|
||||
- Atomic Test #1: Windows - Delete Volume Shadow Copies [windows]
|
||||
- Atomic Test #2: Windows - Delete Volume Shadow Copies via WMI [windows]
|
||||
- Atomic Test #3: Windows - Delete Windows Backup Catalog [windows]
|
||||
- Atomic Test #4: Windows - Disable Windows Recovery Console Repair [windows]
|
||||
- Atomic Test #5: Windows - Delete Volume Shadow Copies via WMI with PowerShell [windows]
|
||||
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1496 Resource Hijacking](./T1496/T1496.md)
|
||||
- Atomic Test #1: macOS/Linux - Simulate CPU Load with Yes [macos, linux]
|
||||
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1489 Service Stop](./T1489/T1489.md)
|
||||
- Atomic Test #1: Windows - Stop service using Service Controller [windows]
|
||||
- Atomic Test #2: Windows - Stop service using net.exe [windows]
|
||||
- Atomic Test #3: Windows - Stop service by killing process [windows]
|
||||
- T1492 Stored Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1529 System Shutdown/Reboot](./T1529/T1529.md)
|
||||
- Atomic Test #1: Shutdown System - Windows [windows]
|
||||
- Atomic Test #2: Restart System - Windows [windows]
|
||||
- Atomic Test #3: Restart System via `shutdown` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #4: Shutdown System via `shutdown` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #5: Restart System via `reboot` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #6: Shutdown System via `halt` - Linux [linux]
|
||||
- Atomic Test #7: Reboot System via `halt` - Linux [linux]
|
||||
- Atomic Test #8: Shutdown System via `poweroff` - Linux [linux]
|
||||
- Atomic Test #9: Reboot System via `poweroff` - Linux [linux]
|
||||
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# discovery
|
||||
- [T1087 Account Discovery](./T1087/T1087.md)
|
||||
- Atomic Test #1: Enumerate all accounts [linux, macos]
|
||||
- Atomic Test #2: View sudoers access [linux, macos]
|
||||
- Atomic Test #3: View accounts with UID 0 [linux, macos]
|
||||
- Atomic Test #4: List opened files by user [linux, macos]
|
||||
- Atomic Test #5: Show if a user account has ever logged in remotely [linux]
|
||||
- Atomic Test #6: Enumerate users and groups [linux, macos]
|
||||
- Atomic Test #7: Enumerate users and groups [macos]
|
||||
- Atomic Test #8: Enumerate all accounts [windows]
|
||||
- Atomic Test #9: Enumerate all accounts via PowerShell [windows]
|
||||
- Atomic Test #10: Enumerate logged on users [windows]
|
||||
- Atomic Test #11: Enumerate logged on users via PowerShell [windows]
|
||||
- [T1010 Application Window Discovery](./T1010/T1010.md)
|
||||
- Atomic Test #1: List Process Main Windows - C# .NET [windows]
|
||||
- [T1217 Browser Bookmark Discovery](./T1217/T1217.md)
|
||||
- Atomic Test #1: List Mozilla Firefox Bookmark Database Files on Linux [linux]
|
||||
- Atomic Test #2: List Mozilla Firefox Bookmark Database Files on macOS [macos]
|
||||
- Atomic Test #3: List Google Chrome Bookmark JSON Files on macOS [macos]
|
||||
- Atomic Test #4: List Google Chrome Bookmarks on Windows with powershell [windows]
|
||||
- Atomic Test #5: List Google Chrome Bookmarks on Windows with command prompt [windows]
|
||||
- T1538 Cloud Service Dashboard [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1526 Cloud Service Discovery [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1482 Domain Trust Discovery](./T1482/T1482.md)
|
||||
- Atomic Test #1: Windows - Discover domain trusts with dsquery [windows]
|
||||
- Atomic Test #2: Windows - Discover domain trusts with nltest [windows]
|
||||
- Atomic Test #3: Powershell enumerate domains and forests [windows]
|
||||
- [T1083 File and Directory Discovery](./T1083/T1083.md)
|
||||
- Atomic Test #1: File and Directory Discovery (cmd.exe) [windows]
|
||||
- Atomic Test #2: File and Directory Discovery (PowerShell) [windows]
|
||||
- Atomic Test #3: Nix File and Diectory Discovery [macos, linux]
|
||||
- Atomic Test #4: Nix File and Directory Discovery 2 [macos, linux]
|
||||
- [T1046 Network Service Scanning](./T1046/T1046.md)
|
||||
- Atomic Test #1: Port Scan [linux, macos]
|
||||
- Atomic Test #2: Port Scan Nmap [linux, macos]
|
||||
- [T1135 Network Share Discovery](./T1135/T1135.md)
|
||||
- Atomic Test #1: Network Share Discovery [macos, linux]
|
||||
- Atomic Test #2: Network Share Discovery command prompt [windows]
|
||||
- Atomic Test #3: Network Share Discovery PowerShell [windows]
|
||||
- Atomic Test #4: View available share drives [windows]
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #1: Packet Capture Linux [linux]
|
||||
- Atomic Test #2: Packet Capture macOS [macos]
|
||||
- Atomic Test #3: Packet Capture Windows Command Prompt [windows]
|
||||
- Atomic Test #4: Packet Capture PowerShell [windows]
|
||||
- [T1201 Password Policy Discovery](./T1201/T1201.md)
|
||||
- Atomic Test #1: Examine password complexity policy - Ubuntu [linux]
|
||||
- Atomic Test #2: Examine password complexity policy - CentOS/RHEL 7.x [linux]
|
||||
- Atomic Test #3: Examine password complexity policy - CentOS/RHEL 6.x [linux]
|
||||
- Atomic Test #4: Examine password expiration policy - All Linux [linux]
|
||||
- Atomic Test #5: Examine local password policy - Windows [windows]
|
||||
- Atomic Test #6: Examine domain password policy - Windows [windows]
|
||||
- Atomic Test #7: Examine password policy - macOS [macos]
|
||||
- T1120 Peripheral Device Discovery [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1069 Permission Groups Discovery](./T1069/T1069.md)
|
||||
- Atomic Test #1: Permission Groups Discovery [macos, linux]
|
||||
- Atomic Test #2: Basic Permission Groups Discovery Windows [windows]
|
||||
- Atomic Test #3: Permission Groups Discovery PowerShell [windows]
|
||||
- Atomic Test #4: Elevated group enumeration using net group [windows]
|
||||
- [T1057 Process Discovery](./T1057/T1057.md)
|
||||
- Atomic Test #1: Process Discovery - ps [macos, linux]
|
||||
- Atomic Test #2: Process Discovery - tasklist [windows]
|
||||
- [T1012 Query Registry](./T1012/T1012.md)
|
||||
- Atomic Test #1: Query Registry [windows]
|
||||
- [T1018 Remote System Discovery](./T1018/T1018.md)
|
||||
- Atomic Test #1: Remote System Discovery - net [windows]
|
||||
- Atomic Test #2: Remote System Discovery - net group Domain Computers [windows]
|
||||
- Atomic Test #3: Remote System Discovery - nltest [windows]
|
||||
- Atomic Test #4: Remote System Discovery - ping sweep [windows]
|
||||
- Atomic Test #5: Remote System Discovery - arp [windows]
|
||||
- Atomic Test #6: Remote System Discovery - arp nix [linux, macos]
|
||||
- Atomic Test #7: Remote System Discovery - sweep [linux, macos]
|
||||
- Atomic Test #8: Remote System Discovery - nslookup [windows]
|
||||
- [T1063 Security Software Discovery](./T1063/T1063.md)
|
||||
- Atomic Test #1: Security Software Discovery [windows]
|
||||
- Atomic Test #2: Security Software Discovery - powershell [windows]
|
||||
- Atomic Test #3: Security Software Discovery - ps [linux, macos]
|
||||
- Atomic Test #4: Security Software Discovery - Sysmon Service [windows]
|
||||
- Atomic Test #5: Security Software Discovery - AV Discovery via WMI [windows]
|
||||
- [T1518 Software Discovery](./T1518/T1518.md)
|
||||
- Atomic Test #1: Find and Display Internet Explorer Browser Version [windows]
|
||||
- Atomic Test #2: Applications Installed [windows]
|
||||
- [T1082 System Information Discovery](./T1082/T1082.md)
|
||||
- Atomic Test #1: System Information Discovery [windows]
|
||||
- Atomic Test #2: System Information Discovery [linux, macos]
|
||||
- Atomic Test #3: List OS Information [linux, macos]
|
||||
- Atomic Test #4: Linux VM Check via Hardware [linux]
|
||||
- Atomic Test #5: Linux VM Check via Kernel Modules [linux]
|
||||
- Atomic Test #6: Hostname Discovery (Windows) [windows]
|
||||
- Atomic Test #7: Hostname Discovery [linux, macos]
|
||||
- Atomic Test #8: Windows MachineGUID Discovery [windows]
|
||||
- [T1016 System Network Configuration Discovery](./T1016/T1016.md)
|
||||
- Atomic Test #1: System Network Configuration Discovery [windows]
|
||||
- Atomic Test #2: List Windows Firewall Rules [windows]
|
||||
- Atomic Test #3: System Network Configuration Discovery [macos, linux]
|
||||
- Atomic Test #4: System Network Configuration Discovery (TrickBot Style) [windows]
|
||||
- Atomic Test #5: List Open Egress Ports [windows]
|
||||
- [T1049 System Network Connections Discovery](./T1049/T1049.md)
|
||||
- Atomic Test #1: System Network Connections Discovery [windows]
|
||||
- Atomic Test #2: System Network Connections Discovery with PowerShell [windows]
|
||||
- Atomic Test #3: System Network Connections Discovery Linux & MacOS [linux, macos]
|
||||
- [T1033 System Owner/User Discovery](./T1033/T1033.md)
|
||||
- Atomic Test #1: System Owner/User Discovery [windows]
|
||||
- Atomic Test #2: System Owner/User Discovery [linux, macos]
|
||||
- [T1007 System Service Discovery](./T1007/T1007.md)
|
||||
- Atomic Test #1: System Service Discovery [windows]
|
||||
- Atomic Test #2: System Service Discovery - net.exe [windows]
|
||||
- [T1124 System Time Discovery](./T1124/T1124.md)
|
||||
- Atomic Test #1: System Time Discovery [windows]
|
||||
- Atomic Test #2: System Time Discovery - PowerShell [windows]
|
||||
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# credential-access
|
||||
- [T1098 Account Manipulation](./T1098/T1098.md)
|
||||
- Atomic Test #1: Admin Account Manipulate [windows]
|
||||
- [T1139 Bash History](./T1139/T1139.md)
|
||||
- Atomic Test #1: Search Through Bash History [linux, macos]
|
||||
- [T1110 Brute Force](./T1110/T1110.md)
|
||||
- Atomic Test #1: Brute Force Credentials [windows]
|
||||
- T1522 Cloud Instance Metadata API [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1003 Credential Dumping](./T1003/T1003.md)
|
||||
- Atomic Test #1: Powershell Mimikatz [windows]
|
||||
- Atomic Test #2: Gsecdump [windows]
|
||||
- Atomic Test #3: Windows Credential Editor [windows]
|
||||
- Atomic Test #4: Registry dump of SAM, creds, and secrets [windows]
|
||||
- Atomic Test #5: Dump LSASS.exe Memory using ProcDump [windows]
|
||||
- Atomic Test #6: Dump LSASS.exe Memory using Windows Task Manager [windows]
|
||||
- Atomic Test #7: Offline Credential Theft With Mimikatz [windows]
|
||||
- Atomic Test #8: Dump Active Directory Database with NTDSUtil [windows]
|
||||
- Atomic Test #9: Create Volume Shadow Copy with NTDS.dit [windows]
|
||||
- Atomic Test #10: Copy NTDS.dit from Volume Shadow Copy [windows]
|
||||
- Atomic Test #11: GPP Passwords (findstr) [windows]
|
||||
- Atomic Test #12: GPP Passwords (Get-GPPPassword) [windows]
|
||||
- Atomic Test #13: LSASS read with pypykatz [windows]
|
||||
- Atomic Test #14: Registry parse with pypykatz [windows]
|
||||
- T1503 Credentials from Web Browsers [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1081 Credentials in Files](./T1081/T1081.md)
|
||||
- Atomic Test #1: Extract Browser and System credentials with LaZagne [macos]
|
||||
- Atomic Test #2: Extract passwords with grep [macos, linux]
|
||||
- Atomic Test #3: Extracting passwords with findstr [windows]
|
||||
- Atomic Test #4: Access unattend.xml [windows]
|
||||
- [T1214 Credentials in Registry](./T1214/T1214.md)
|
||||
- Atomic Test #1: Enumeration for Credentials in Registry [windows]
|
||||
- Atomic Test #2: Enumeration for PuTTY Credentials in Registry [windows]
|
||||
- T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1187 Forced Authentication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1179 Hooking](./T1179/T1179.md)
|
||||
- Atomic Test #1: Hook PowerShell TLS Encrypt/Decrypt Messages [windows]
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- Atomic Test #1: Input Capture [windows]
|
||||
- [T1141 Input Prompt](./T1141/T1141.md)
|
||||
- Atomic Test #1: AppleScript - Prompt User for Password [macos]
|
||||
- Atomic Test #2: PowerShell - Prompt User for Password [windows]
|
||||
- [T1208 Kerberoasting](./T1208/T1208.md)
|
||||
- Atomic Test #1: Request for service tickets [windows]
|
||||
- [T1142 Keychain](./T1142/T1142.md)
|
||||
- Atomic Test #1: Keychain [macos]
|
||||
- T1171 LLMNR/NBT-NS Poisoning and Relay [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #1: Packet Capture Linux [linux]
|
||||
- Atomic Test #2: Packet Capture macOS [macos]
|
||||
- Atomic Test #3: Packet Capture Windows Command Prompt [windows]
|
||||
- Atomic Test #4: Packet Capture PowerShell [windows]
|
||||
- [T1174 Password Filter DLL](./T1174/T1174.md)
|
||||
- Atomic Test #1: Install and Register Password Filter DLL [windows]
|
||||
- [T1145 Private Keys](./T1145/T1145.md)
|
||||
- Atomic Test #1: Private Keys [windows]
|
||||
- Atomic Test #2: Discover Private SSH Keys [macos, linux]
|
||||
- Atomic Test #3: Copy Private SSH Keys with CP [linux]
|
||||
- Atomic Test #4: Copy Private SSH Keys with rsync [macos, linux]
|
||||
- T1167 Securityd Memory [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1528 Steal Application Access Token [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1539 Steal Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1111 Two-Factor Authentication Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# execution
|
||||
- [T1155 AppleScript](./T1155/T1155.md)
|
||||
- Atomic Test #1: AppleScript [macos]
|
||||
- [T1191 CMSTP](./T1191/T1191.md)
|
||||
- Atomic Test #1: CMSTP Executing Remote Scriptlet [windows]
|
||||
- Atomic Test #2: CMSTP Executing UAC Bypass [windows]
|
||||
- [T1059 Command-Line Interface](./T1059/T1059.md)
|
||||
- Atomic Test #1: Command-Line Interface [macos, linux]
|
||||
- [T1223 Compiled HTML File](./T1223/T1223.md)
|
||||
- Atomic Test #1: Compiled HTML Help Local Payload [windows]
|
||||
- Atomic Test #2: Compiled HTML Help Remote Payload [windows]
|
||||
- T1175 Component Object Model and Distributed COM [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1196 Control Panel Items](./T1196/T1196.md)
|
||||
- Atomic Test #1: Control Panel Items [windows]
|
||||
- [T1173 Dynamic Data Exchange](./T1173/T1173.md)
|
||||
- Atomic Test #1: Execute Commands [windows]
|
||||
- Atomic Test #2: Execute PowerShell script via Word DDE [windows]
|
||||
- T1106 Execution through API [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1129 Execution through Module Load [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1118 InstallUtil](./T1118/T1118.md)
|
||||
- Atomic Test #1: CheckIfInstallable method call [windows]
|
||||
- Atomic Test #2: InstallHelper method call [windows]
|
||||
- Atomic Test #3: InstallUtil class constructor method call [windows]
|
||||
- Atomic Test #4: InstallUtil Install method call [windows]
|
||||
- Atomic Test #5: InstallUtil Uninstall method call - /U variant [windows]
|
||||
- Atomic Test #6: InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant [windows]
|
||||
- Atomic Test #7: InstallUtil HelpText method call [windows]
|
||||
- Atomic Test #8: InstallUtil evasive invocation [windows]
|
||||
- T1177 LSASS Driver [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1152 Launchctl](./T1152/T1152.md)
|
||||
- Atomic Test #1: Launchctl [macos]
|
||||
- [T1168 Local Job Scheduling](./T1168/T1168.md)
|
||||
- Atomic Test #1: Cron - Replace crontab with referenced file [macos, linux]
|
||||
- Atomic Test #2: Cron - Add script to cron folder [macos, linux]
|
||||
- Atomic Test #3: Event Monitor Daemon Persistence [macos, linux]
|
||||
- [T1170 Mshta](./T1170/T1170.md)
|
||||
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Mshta calls a local VBScript file to launch notepad.exe [windows]
|
||||
- Atomic Test #3: Mshta executes VBScript to execute malicious command [windows]
|
||||
- Atomic Test #4: Mshta Executes Remote HTML Application (HTA) [windows]
|
||||
- [T1086 PowerShell](./T1086/T1086.md)
|
||||
- Atomic Test #1: Mimikatz [windows]
|
||||
- Atomic Test #2: BloodHound [windows]
|
||||
- Atomic Test #3: Obfuscation Tests [windows]
|
||||
- Atomic Test #4: Mimikatz - Cradlecraft PsSendKeys [windows]
|
||||
- Atomic Test #5: Invoke-AppPathBypass [windows]
|
||||
- Atomic Test #6: PowerShell Add User [windows]
|
||||
- Atomic Test #7: Powershell MsXml COM object - no prompt [windows]
|
||||
- Atomic Test #8: Powershell MsXml COM object - with prompt [windows]
|
||||
- Atomic Test #9: Powershell XML requests [windows]
|
||||
- Atomic Test #10: Powershell invoke mshta.exe download [windows]
|
||||
- Atomic Test #11: Powershell Invoke-DownloadCradle [windows]
|
||||
- Atomic Test #12: PowerShell Fileless Script Execution [windows]
|
||||
- Atomic Test #13: PowerShell Downgrade Attack [windows]
|
||||
- Atomic Test #14: NTFS Alternate Data Stream Access [windows]
|
||||
- [T1121 Regsvcs/Regasm](./T1121/T1121.md)
|
||||
- Atomic Test #1: Regasm Uninstall Method Call Test [windows]
|
||||
- Atomic Test #2: Regsvs Uninstall Method Call Test [windows]
|
||||
- [T1117 Regsvr32](./T1117/T1117.md)
|
||||
- Atomic Test #1: Regsvr32 local COM scriptlet execution [windows]
|
||||
- Atomic Test #2: Regsvr32 remote COM scriptlet execution [windows]
|
||||
- Atomic Test #3: Regsvr32 local DLL execution [windows]
|
||||
- [T1085 Rundll32](./T1085/T1085.md)
|
||||
- Atomic Test #1: Rundll32 execute JavaScript Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Rundll32 execute VBscript command [windows]
|
||||
- Atomic Test #3: Rundll32 advpack.dll Execution [windows]
|
||||
- Atomic Test #4: Rundll32 ieadvpack.dll Execution [windows]
|
||||
- Atomic Test #5: Rundll32 syssetup.dll Execution [windows]
|
||||
- Atomic Test #6: Rundll32 setupapi.dll Execution [windows]
|
||||
- [T1053 Scheduled Task](./T1053/T1053.md)
|
||||
- Atomic Test #1: At.exe Scheduled task [windows]
|
||||
- Atomic Test #2: Scheduled task Local [windows]
|
||||
- Atomic Test #3: Scheduled task Remote [windows]
|
||||
- Atomic Test #4: Powershell Cmdlet Scheduled Task [windows]
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #1: Create and Execute Bash Shell Script [macos, linux]
|
||||
- Atomic Test #2: Create and Execute Batch Script [windows]
|
||||
- [T1035 Service Execution](./T1035/T1035.md)
|
||||
- Atomic Test #1: Execute a Command as a Service [windows]
|
||||
- Atomic Test #2: Use PsExec to execute a command on a remote host [windows]
|
||||
- [T1218 Signed Binary Proxy Execution](./T1218/T1218.md)
|
||||
- Atomic Test #1: mavinject - Inject DLL into running process [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer - Execute arbitrary PowerShell code [windows]
|
||||
- Atomic Test #3: Register-CimProvider - Execute evil dll [windows]
|
||||
- Atomic Test #4: Msiexec.exe - Execute Local MSI file [windows]
|
||||
- Atomic Test #5: Msiexec.exe - Execute Remote MSI file [windows]
|
||||
- Atomic Test #6: Msiexec.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #7: Odbcconf.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #8: InfDefaultInstall.exe .inf Execution [windows]
|
||||
- [T1216 Signed Script Proxy Execution](./T1216/T1216.md)
|
||||
- Atomic Test #1: PubPrn.vbs Signed Script Bypass [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer Signed Script PowerShell Command Execution [windows]
|
||||
- Atomic Test #3: manage-bde.wsf Signed Script Command Execution [windows]
|
||||
- [T1153 Source](./T1153/T1153.md)
|
||||
- Atomic Test #1: Execute Script using Source [macos, linux]
|
||||
- Atomic Test #2: Execute Script using Source Alias [macos, linux]
|
||||
- [T1151 Space after Filename](./T1151/T1151.md)
|
||||
- Atomic Test #1: Space After Filename [macos]
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1154 Trap](./T1154/T1154.md)
|
||||
- Atomic Test #1: Trap [macos, linux]
|
||||
- [T1127 Trusted Developer Utilities](./T1127/T1127.md)
|
||||
- Atomic Test #1: MSBuild Bypass Using Inline Tasks [windows]
|
||||
- [T1204 User Execution](./T1204/T1204.md)
|
||||
- Atomic Test #1: OSTap Style Macro Execution [windows]
|
||||
- Atomic Test #2: Maldoc choice flags command execution [windows]
|
||||
- Atomic Test #3: OSTAP JS version [windows]
|
||||
- [T1047 Windows Management Instrumentation](./T1047/T1047.md)
|
||||
- Atomic Test #1: WMI Reconnaissance Users [windows]
|
||||
- Atomic Test #2: WMI Reconnaissance Processes [windows]
|
||||
- Atomic Test #3: WMI Reconnaissance Software [windows]
|
||||
- Atomic Test #4: WMI Reconnaissance List Remote Services [windows]
|
||||
- Atomic Test #5: WMI Execute Local Process [windows]
|
||||
- Atomic Test #6: WMI Execute Remote Process [windows]
|
||||
- [T1028 Windows Remote Management](./T1028/T1028.md)
|
||||
- Atomic Test #1: Enable Windows Remote Management [windows]
|
||||
- Atomic Test #2: PowerShell Lateral Movement [windows]
|
||||
- Atomic Test #3: WMIC Process Call Create [windows]
|
||||
- Atomic Test #4: Psexec [windows]
|
||||
- Atomic Test #5: Invoke-Command [windows]
|
||||
- [T1220 XSL Script Processing](./T1220/T1220.md)
|
||||
- Atomic Test #1: MSXSL Bypass using local files [windows]
|
||||
- Atomic Test #2: MSXSL Bypass using remote files [windows]
|
||||
- Atomic Test #3: WMIC bypass using local XSL file [windows]
|
||||
- Atomic Test #4: WMIC bypass using remote XSL file [windows]
|
||||
|
||||
# lateral-movement
|
||||
- [T1155 AppleScript](./T1155/T1155.md)
|
||||
- Atomic Test #1: AppleScript [macos]
|
||||
- T1527 Application Access Token [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1017 Application Deployment Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1175 Component Object Model and Distributed COM [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1210 Exploitation of Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1534 Internal Spearphishing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1037 Logon Scripts](./T1037/T1037.md)
|
||||
- Atomic Test #1: Logon Scripts [windows]
|
||||
- Atomic Test #2: Scheduled Task Startup Script [windows]
|
||||
- Atomic Test #3: Logon Scripts - Mac [macos]
|
||||
- Atomic Test #4: Supicious vbs file run from startup Folder [windows]
|
||||
- Atomic Test #5: Supicious jse file run from startup Folder [windows]
|
||||
- Atomic Test #6: Supicious bat file run from startup Folder [windows]
|
||||
- [T1075 Pass the Hash](./T1075/T1075.md)
|
||||
- Atomic Test #1: Mimikatz Pass the Hash [windows]
|
||||
- Atomic Test #2: crackmapexec Pass the Hash [windows]
|
||||
- [T1097 Pass the Ticket](./T1097/T1097.md)
|
||||
- Atomic Test #1: Mimikatz Kerberos Ticket Attack [windows]
|
||||
- [T1076 Remote Desktop Protocol](./T1076/T1076.md)
|
||||
- Atomic Test #1: RDP [windows]
|
||||
- Atomic Test #2: RDPto-DomainController [windows]
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
|
||||
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #3: scp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #7: certutil download (urlcache) [windows]
|
||||
- Atomic Test #8: certutil download (verifyctl) [windows]
|
||||
- Atomic Test #9: Windows - BITSAdmin BITS Download [windows]
|
||||
- Atomic Test #10: Windows - PowerShell Download [windows]
|
||||
- Atomic Test #11: OSTAP Worming Activity [windows]
|
||||
- T1021 Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1091 Replication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1184 SSH Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1051 Shared Webroot [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1080 Taint Shared Content [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1506 Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1077 Windows Admin Shares](./T1077/T1077.md)
|
||||
- Atomic Test #1: Map admin share [windows]
|
||||
- Atomic Test #2: Map Admin Share PowerShell [windows]
|
||||
- Atomic Test #3: Copy and Execute File with PsExec [windows]
|
||||
- Atomic Test #4: Execute command writing output to local Admin Share [windows]
|
||||
- [T1028 Windows Remote Management](./T1028/T1028.md)
|
||||
- Atomic Test #1: Enable Windows Remote Management [windows]
|
||||
- Atomic Test #2: PowerShell Lateral Movement [windows]
|
||||
- Atomic Test #3: WMIC Process Call Create [windows]
|
||||
- Atomic Test #4: Psexec [windows]
|
||||
- Atomic Test #5: Invoke-Command [windows]
|
||||
|
||||
# collection
|
||||
- [T1123 Audio Capture](./T1123/T1123.md)
|
||||
- Atomic Test #1: using device audio capture commandlet [windows]
|
||||
- [T1119 Automated Collection](./T1119/T1119.md)
|
||||
- Atomic Test #1: Automated Collection Command Prompt [windows]
|
||||
- Atomic Test #2: Automated Collection PowerShell [windows]
|
||||
- Atomic Test #3: Recon information for export with PowerShell [windows]
|
||||
- Atomic Test #4: Recon information for export with Command Prompt [windows]
|
||||
- [T1115 Clipboard Data](./T1115/T1115.md)
|
||||
- Atomic Test #1: Utilize Clipboard to store or execute commands from [windows]
|
||||
- Atomic Test #2: PowerShell [windows]
|
||||
- [T1074 Data Staged](./T1074/T1074.md)
|
||||
- Atomic Test #1: Stage data from Discovery.bat [windows]
|
||||
- Atomic Test #2: Stage data from Discovery.sh [linux, macos]
|
||||
- Atomic Test #3: Zip a Folder with PowerShell for Staging in Temp [windows]
|
||||
- T1530 Data from Cloud Storage Object [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1213 Data from Information Repositories [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1005 Data from Local System](./T1005/T1005.md)
|
||||
- Atomic Test #1: Search macOS Safari Cookies [macos]
|
||||
- T1039 Data from Network Shared Drive [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1025 Data from Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1114 Email Collection](./T1114/T1114.md)
|
||||
- Atomic Test #1: T1114 Email Collection with PowerShell [windows]
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- Atomic Test #1: Input Capture [windows]
|
||||
- T1185 Man in the Browser [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1113 Screen Capture](./T1113/T1113.md)
|
||||
- Atomic Test #1: Screencapture [macos]
|
||||
- Atomic Test #2: Screencapture (silent) [macos]
|
||||
- Atomic Test #3: X Windows Capture [linux]
|
||||
- Atomic Test #4: Import [linux]
|
||||
- T1125 Video Capture [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# exfiltration
|
||||
- T1020 Automated Exfiltration [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1002 Data Compressed](./T1002/T1002.md)
|
||||
- Atomic Test #1: Compress Data for Exfiltration With PowerShell [windows]
|
||||
- Atomic Test #2: Compress Data for Exfiltration With Rar [windows]
|
||||
- Atomic Test #3: Data Compressed - nix - zip [linux, macos]
|
||||
- Atomic Test #4: Data Compressed - nix - gzip Single File [linux, macos]
|
||||
- Atomic Test #5: Data Compressed - nix - tar Folder or File [linux, macos]
|
||||
- [T1022 Data Encrypted](./T1022/T1022.md)
|
||||
- Atomic Test #1: Data Encrypted with zip and gpg symmetric [macos, linux]
|
||||
- Atomic Test #2: Compress Data and lock with password for Exfiltration with winrar [windows]
|
||||
- Atomic Test #3: Compress Data and lock with password for Exfiltration with winzip [windows]
|
||||
- Atomic Test #4: Compress Data and lock with password for Exfiltration with 7zip [windows]
|
||||
- [T1030 Data Transfer Size Limits](./T1030/T1030.md)
|
||||
- Atomic Test #1: Data Transfer Size Limits [macos, linux]
|
||||
- [T1048 Exfiltration Over Alternative Protocol](./T1048/T1048.md)
|
||||
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux]
|
||||
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux]
|
||||
- Atomic Test #3: Exfiltration Over Alternative Protocol - HTTP [macos, linux]
|
||||
- Atomic Test #4: Exfiltration Over Alternative Protocol - ICMP [windows]
|
||||
- Atomic Test #5: Exfiltration Over Alternative Protocol - DNS [linux]
|
||||
- T1041 Exfiltration Over Command and Control Channel [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1011 Exfiltration Over Other Network Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1029 Scheduled Transfer [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1537 Transfer Data to Cloud Account [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# command-and-control
|
||||
- T1043 Commonly Used Port [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1092 Communication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #1: Connection Proxy [macos, linux]
|
||||
- Atomic Test #2: portproxy reg key [windows]
|
||||
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1024 Custom Cryptographic Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1132 Data Encoding](./T1132/T1132.md)
|
||||
- Atomic Test #1: Base64 Encoded data. [macos, linux]
|
||||
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1172 Domain Fronting [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1483 Domain Generation Algorithms [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1104 Multi-Stage Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1188 Multi-hop Proxy [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1026 Multiband Communication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1079 Multilayer Encryption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1219 Remote Access Tools](./T1219/T1219.md)
|
||||
- Atomic Test #1: TeamViewer Files Detected Test on Windows [windows]
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
|
||||
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #3: scp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #7: certutil download (urlcache) [windows]
|
||||
- Atomic Test #8: certutil download (verifyctl) [windows]
|
||||
- Atomic Test #9: Windows - BITSAdmin BITS Download [windows]
|
||||
- Atomic Test #10: Windows - PowerShell Download [windows]
|
||||
- Atomic Test #11: OSTAP Worming Activity [windows]
|
||||
- [T1071 Standard Application Layer Protocol](./T1071/T1071.md)
|
||||
- Atomic Test #1: Malicious User Agents - Powershell [windows]
|
||||
- Atomic Test #2: Malicious User Agents - CMD [windows]
|
||||
- Atomic Test #3: Malicious User Agents - Nix [linux, macos]
|
||||
- Atomic Test #4: DNS Large Query Volume [windows]
|
||||
- Atomic Test #5: DNS Regular Beaconing [windows]
|
||||
- Atomic Test #6: DNS Long Domain Query [windows]
|
||||
- Atomic Test #7: DNS C2 [windows]
|
||||
- Atomic Test #8: OSTap Payload Download [windows]
|
||||
- [T1032 Standard Cryptographic Protocol](./T1032/T1032.md)
|
||||
- Atomic Test #1: OpenSSL C2 [windows]
|
||||
- [T1095 Standard Non-Application Layer Protocol](./T1095/T1095.md)
|
||||
- Atomic Test #1: ICMP C2 [windows]
|
||||
- Atomic Test #2: Netcat C2 [windows]
|
||||
- Atomic Test #3: Powercat C2 [windows]
|
||||
- [T1065 Uncommonly Used Port](./T1065/T1065.md)
|
||||
- Atomic Test #1: Testing usage of uncommonly used port with PowerShell [windows]
|
||||
- Atomic Test #2: Testing usage of uncommonly used port [linux, macos]
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
- Atomic Test #1: Reach out to C2 Pointer URLs via command_prompt [windows]
|
||||
- Atomic Test #2: Reach out to C2 Pointer URLs via powershell [windows]
|
||||
|
||||
# initial-access
|
||||
- T1189 Drive-by Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1190 Exploit Public-Facing Application [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1133 External Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1200 Hardware Additions [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1091 Replication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1193 Spearphishing Attachment](./T1193/T1193.md)
|
||||
- Atomic Test #1: Download Phishing Attachment - VBScript [windows]
|
||||
- T1192 Spearphishing Link [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1194 Spearphishing via Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1195 Supply Chain Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1199 Trusted Relationship [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
@@ -0,0 +1,345 @@
|
||||
# Linux Atomic Tests by ATT&CK Tactic & Technique
|
||||
# persistence
|
||||
- [T1156 .bash_profile and .bashrc](./T1156/T1156.md)
|
||||
- Atomic Test #1: Add command to .bash_profile [macos, linux]
|
||||
- Atomic Test #2: Add command to .bashrc [macos, linux]
|
||||
- [T1098 Account Manipulation](./T1098/T1098.md)
|
||||
- T1067 Bootkit [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1176 Browser Extensions](./T1176/T1176.md)
|
||||
- Atomic Test #1: Chrome (Developer Mode) [linux, windows, macos]
|
||||
- Atomic Test #2: Chrome (Chrome Web Store) [linux, windows, macos]
|
||||
- Atomic Test #3: Firefox [linux, windows, macos]
|
||||
- [T1136 Create Account](./T1136/T1136.md)
|
||||
- Atomic Test #1: Create a user account on a Linux system [linux]
|
||||
- Atomic Test #5: Create a new user in Linux with `root` UID and GID. [linux]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
|
||||
- T1525 Implant Container Image [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1215 Kernel Modules and Extensions](./T1215/T1215.md)
|
||||
- Atomic Test #1: Linux - Load Kernel Module via insmod [linux]
|
||||
- [T1168 Local Job Scheduling](./T1168/T1168.md)
|
||||
- Atomic Test #1: Cron - Replace crontab with referenced file [macos, linux]
|
||||
- Atomic Test #2: Cron - Add script to cron folder [macos, linux]
|
||||
- Atomic Test #3: Event Monitor Daemon Persistence [macos, linux]
|
||||
- [T1137 Office Application Startup](./T1137/T1137.md)
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1505 Server Software Component](./T1505/T1505.md)
|
||||
- [T1166 Setuid and Setgid](./T1166/T1166.md)
|
||||
- Atomic Test #1: Make and modify binary from C source [macos, linux]
|
||||
- Atomic Test #2: Set a SetUID flag on file [macos, linux]
|
||||
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
|
||||
- [T1501 Systemd Service](./T1501/T1501.md)
|
||||
- Atomic Test #1: Create Systemd Service [linux]
|
||||
- [T1154 Trap](./T1154/T1154.md)
|
||||
- Atomic Test #1: Trap [macos, linux]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
|
||||
# impact
|
||||
- [T1531 Account Access Removal](./T1531/T1531.md)
|
||||
- [T1485 Data Destruction](./T1485/T1485.md)
|
||||
- Atomic Test #5: macOS/Linux - Overwrite file with DD [linux, macos]
|
||||
- T1486 Data Encrypted for Impact [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1491 Defacement [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1488 Disk Content Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1487 Disk Structure Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1499 Endpoint Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1495 Firmware Corruption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1490 Inhibit System Recovery](./T1490/T1490.md)
|
||||
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1496 Resource Hijacking](./T1496/T1496.md)
|
||||
- Atomic Test #1: macOS/Linux - Simulate CPU Load with Yes [macos, linux]
|
||||
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1492 Stored Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1529 System Shutdown/Reboot](./T1529/T1529.md)
|
||||
- Atomic Test #3: Restart System via `shutdown` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #4: Shutdown System via `shutdown` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #5: Restart System via `reboot` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #6: Shutdown System via `halt` - Linux [linux]
|
||||
- Atomic Test #7: Reboot System via `halt` - Linux [linux]
|
||||
- Atomic Test #8: Shutdown System via `poweroff` - Linux [linux]
|
||||
- Atomic Test #9: Reboot System via `poweroff` - Linux [linux]
|
||||
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# discovery
|
||||
- [T1087 Account Discovery](./T1087/T1087.md)
|
||||
- Atomic Test #1: Enumerate all accounts [linux, macos]
|
||||
- Atomic Test #2: View sudoers access [linux, macos]
|
||||
- Atomic Test #3: View accounts with UID 0 [linux, macos]
|
||||
- Atomic Test #4: List opened files by user [linux, macos]
|
||||
- Atomic Test #5: Show if a user account has ever logged in remotely [linux]
|
||||
- Atomic Test #6: Enumerate users and groups [linux, macos]
|
||||
- [T1217 Browser Bookmark Discovery](./T1217/T1217.md)
|
||||
- Atomic Test #1: List Mozilla Firefox Bookmark Database Files on Linux [linux]
|
||||
- T1538 Cloud Service Dashboard [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1526 Cloud Service Discovery [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1083 File and Directory Discovery](./T1083/T1083.md)
|
||||
- Atomic Test #3: Nix File and Diectory Discovery [macos, linux]
|
||||
- Atomic Test #4: Nix File and Directory Discovery 2 [macos, linux]
|
||||
- [T1046 Network Service Scanning](./T1046/T1046.md)
|
||||
- Atomic Test #1: Port Scan [linux, macos]
|
||||
- Atomic Test #2: Port Scan Nmap [linux, macos]
|
||||
- [T1135 Network Share Discovery](./T1135/T1135.md)
|
||||
- Atomic Test #1: Network Share Discovery [macos, linux]
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #1: Packet Capture Linux [linux]
|
||||
- [T1201 Password Policy Discovery](./T1201/T1201.md)
|
||||
- Atomic Test #1: Examine password complexity policy - Ubuntu [linux]
|
||||
- Atomic Test #2: Examine password complexity policy - CentOS/RHEL 7.x [linux]
|
||||
- Atomic Test #3: Examine password complexity policy - CentOS/RHEL 6.x [linux]
|
||||
- Atomic Test #4: Examine password expiration policy - All Linux [linux]
|
||||
- [T1069 Permission Groups Discovery](./T1069/T1069.md)
|
||||
- Atomic Test #1: Permission Groups Discovery [macos, linux]
|
||||
- [T1057 Process Discovery](./T1057/T1057.md)
|
||||
- Atomic Test #1: Process Discovery - ps [macos, linux]
|
||||
- [T1018 Remote System Discovery](./T1018/T1018.md)
|
||||
- Atomic Test #6: Remote System Discovery - arp nix [linux, macos]
|
||||
- Atomic Test #7: Remote System Discovery - sweep [linux, macos]
|
||||
- [T1518 Software Discovery](./T1518/T1518.md)
|
||||
- [T1082 System Information Discovery](./T1082/T1082.md)
|
||||
- Atomic Test #2: System Information Discovery [linux, macos]
|
||||
- Atomic Test #3: List OS Information [linux, macos]
|
||||
- Atomic Test #4: Linux VM Check via Hardware [linux]
|
||||
- Atomic Test #5: Linux VM Check via Kernel Modules [linux]
|
||||
- Atomic Test #7: Hostname Discovery [linux, macos]
|
||||
- [T1016 System Network Configuration Discovery](./T1016/T1016.md)
|
||||
- Atomic Test #3: System Network Configuration Discovery [macos, linux]
|
||||
- [T1049 System Network Connections Discovery](./T1049/T1049.md)
|
||||
- Atomic Test #3: System Network Connections Discovery Linux & MacOS [linux, macos]
|
||||
- [T1033 System Owner/User Discovery](./T1033/T1033.md)
|
||||
- Atomic Test #2: System Owner/User Discovery [linux, macos]
|
||||
|
||||
# credential-access
|
||||
- [T1098 Account Manipulation](./T1098/T1098.md)
|
||||
- [T1139 Bash History](./T1139/T1139.md)
|
||||
- Atomic Test #1: Search Through Bash History [linux, macos]
|
||||
- [T1110 Brute Force](./T1110/T1110.md)
|
||||
- T1522 Cloud Instance Metadata API [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1003 Credential Dumping](./T1003/T1003.md)
|
||||
- T1503 Credentials from Web Browsers [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1081 Credentials in Files](./T1081/T1081.md)
|
||||
- Atomic Test #2: Extract passwords with grep [macos, linux]
|
||||
- T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #1: Packet Capture Linux [linux]
|
||||
- [T1145 Private Keys](./T1145/T1145.md)
|
||||
- Atomic Test #2: Discover Private SSH Keys [macos, linux]
|
||||
- Atomic Test #3: Copy Private SSH Keys with CP [linux]
|
||||
- Atomic Test #4: Copy Private SSH Keys with rsync [macos, linux]
|
||||
- T1528 Steal Application Access Token [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1539 Steal Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1111 Two-Factor Authentication Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# defense-evasion
|
||||
- T1527 Application Access Token [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1009 Binary Padding](./T1009/T1009.md)
|
||||
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [macos, linux]
|
||||
- [T1146 Clear Command History](./T1146/T1146.md)
|
||||
- Atomic Test #1: Clear Bash history (rm) [linux, macos]
|
||||
- Atomic Test #2: Clear Bash history (echo) [linux, macos]
|
||||
- Atomic Test #3: Clear Bash history (cat dev/null) [linux, macos]
|
||||
- Atomic Test #4: Clear Bash history (ln dev/null) [linux, macos]
|
||||
- Atomic Test #5: Clear Bash history (truncate) [linux]
|
||||
- Atomic Test #6: Clear history of a bunch of shells [linux, macos]
|
||||
- [T1500 Compile After Delivery](./T1500/T1500.md)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #1: Connection Proxy [macos, linux]
|
||||
- [T1089 Disabling Security Tools](./T1089/T1089.md)
|
||||
- Atomic Test #1: Disable iptables firewall [linux]
|
||||
- Atomic Test #2: Disable syslog [linux]
|
||||
- Atomic Test #3: Disable Cb Response [linux]
|
||||
- Atomic Test #4: Disable SELinux [linux]
|
||||
- T1480 Execution Guardrails [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1107 File Deletion](./T1107/T1107.md)
|
||||
- Atomic Test #1: Delete a single file - Linux/macOS [linux, macos]
|
||||
- Atomic Test #2: Delete an entire folder - Linux/macOS [linux, macos]
|
||||
- Atomic Test #3: Overwrite and delete a file with shred [linux]
|
||||
- Atomic Test #12: Delete Filesystem - Linux [linux]
|
||||
- [T1222 File and Directory Permissions Modification](./T1222/T1222.md)
|
||||
- Atomic Test #8: chmod - Change file or folder mode (numeric mode) [macos, linux]
|
||||
- Atomic Test #9: chmod - Change file or folder mode (symbolic mode) [macos, linux]
|
||||
- Atomic Test #10: chmod - Change file or folder mode (numeric mode) recursively [macos, linux]
|
||||
- Atomic Test #11: chmod - Change file or folder mode (symbolic mode) recursively [macos, linux]
|
||||
- Atomic Test #12: chown - Change file or folder ownership and group [macos, linux]
|
||||
- Atomic Test #13: chown - Change file or folder ownership and group recursively [macos, linux]
|
||||
- Atomic Test #14: chown - Change file or folder mode ownership only [macos, linux]
|
||||
- Atomic Test #15: chown - Change file or folder ownership recursively [macos, linux]
|
||||
- Atomic Test #16: chattr - Remove immutable file attribute [macos, linux]
|
||||
- [T1148 HISTCONTROL](./T1148/T1148.md)
|
||||
- Atomic Test #1: Disable history collection [linux, macos]
|
||||
- Atomic Test #2: Mac HISTCONTROL [macos, linux]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
|
||||
- T1066 Indicator Removal from Tools [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1070 Indicator Removal on Host](./T1070/T1070.md)
|
||||
- Atomic Test #3: rm -rf [macos, linux]
|
||||
- Atomic Test #4: Overwrite Linux Mail Spool [linux]
|
||||
- Atomic Test #5: Overwrite Linux Log [linux]
|
||||
- [T1130 Install Root Certificate](./T1130/T1130.md)
|
||||
- Atomic Test #1: Install root CA on CentOS/RHEL [linux]
|
||||
- [T1036 Masquerading](./T1036/T1036.md)
|
||||
- Atomic Test #2: Masquerading as Linux crond process. [linux]
|
||||
- [T1027 Obfuscated Files or Information](./T1027/T1027.md)
|
||||
- Atomic Test #1: Decode base64 Data into Script [macos, linux]
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- Atomic Test #2: Shared Library Injection via /etc/ld.so.preload [linux]
|
||||
- Atomic Test #3: Shared Library Injection via LD_PRELOAD [linux]
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1536 Revert Cloud Instance [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1014 Rootkit](./T1014/T1014.md)
|
||||
- Atomic Test #1: Loadable Kernel Module based Rootkit [linux]
|
||||
- Atomic Test #2: Loadable Kernel Module based Rootkit [linux]
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #1: Create and Execute Bash Shell Script [macos, linux]
|
||||
- [T1151 Space after Filename](./T1151/T1151.md)
|
||||
- [T1099 Timestomp](./T1099/T1099.md)
|
||||
- Atomic Test #1: Set a file's access timestamp [linux, macos]
|
||||
- Atomic Test #2: Set a file's modification timestamp [linux, macos]
|
||||
- Atomic Test #3: Set a file's creation timestamp [linux, macos]
|
||||
- Atomic Test #4: Modify file timestamps using reference file [linux, macos]
|
||||
- T1535 Unused/Unsupported Cloud Regions [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
- T1506 Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# lateral-movement
|
||||
- T1527 Application Access Token [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1017 Application Deployment Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1210 Exploitation of Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1534 Internal Spearphishing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
|
||||
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #3: scp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
|
||||
- T1021 Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1184 SSH Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1506 Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# collection
|
||||
- [T1123 Audio Capture](./T1123/T1123.md)
|
||||
- [T1119 Automated Collection](./T1119/T1119.md)
|
||||
- [T1115 Clipboard Data](./T1115/T1115.md)
|
||||
- [T1074 Data Staged](./T1074/T1074.md)
|
||||
- Atomic Test #2: Stage data from Discovery.sh [linux, macos]
|
||||
- T1530 Data from Cloud Storage Object [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1213 Data from Information Repositories [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1005 Data from Local System](./T1005/T1005.md)
|
||||
- T1039 Data from Network Shared Drive [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1025 Data from Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1114 Email Collection](./T1114/T1114.md)
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- [T1113 Screen Capture](./T1113/T1113.md)
|
||||
- Atomic Test #3: X Windows Capture [linux]
|
||||
- Atomic Test #4: Import [linux]
|
||||
|
||||
# exfiltration
|
||||
- T1020 Automated Exfiltration [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1002 Data Compressed](./T1002/T1002.md)
|
||||
- Atomic Test #3: Data Compressed - nix - zip [linux, macos]
|
||||
- Atomic Test #4: Data Compressed - nix - gzip Single File [linux, macos]
|
||||
- Atomic Test #5: Data Compressed - nix - tar Folder or File [linux, macos]
|
||||
- [T1022 Data Encrypted](./T1022/T1022.md)
|
||||
- Atomic Test #1: Data Encrypted with zip and gpg symmetric [macos, linux]
|
||||
- [T1030 Data Transfer Size Limits](./T1030/T1030.md)
|
||||
- Atomic Test #1: Data Transfer Size Limits [macos, linux]
|
||||
- [T1048 Exfiltration Over Alternative Protocol](./T1048/T1048.md)
|
||||
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux]
|
||||
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux]
|
||||
- Atomic Test #3: Exfiltration Over Alternative Protocol - HTTP [macos, linux]
|
||||
- Atomic Test #5: Exfiltration Over Alternative Protocol - DNS [linux]
|
||||
- T1041 Exfiltration Over Command and Control Channel [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1011 Exfiltration Over Other Network Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1029 Scheduled Transfer [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1537 Transfer Data to Cloud Account [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# execution
|
||||
- [T1059 Command-Line Interface](./T1059/T1059.md)
|
||||
- Atomic Test #1: Command-Line Interface [macos, linux]
|
||||
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1168 Local Job Scheduling](./T1168/T1168.md)
|
||||
- Atomic Test #1: Cron - Replace crontab with referenced file [macos, linux]
|
||||
- Atomic Test #2: Cron - Add script to cron folder [macos, linux]
|
||||
- Atomic Test #3: Event Monitor Daemon Persistence [macos, linux]
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #1: Create and Execute Bash Shell Script [macos, linux]
|
||||
- [T1153 Source](./T1153/T1153.md)
|
||||
- Atomic Test #1: Execute Script using Source [macos, linux]
|
||||
- Atomic Test #2: Execute Script using Source Alias [macos, linux]
|
||||
- [T1151 Space after Filename](./T1151/T1151.md)
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1154 Trap](./T1154/T1154.md)
|
||||
- Atomic Test #1: Trap [macos, linux]
|
||||
- [T1204 User Execution](./T1204/T1204.md)
|
||||
|
||||
# command-and-control
|
||||
- T1043 Commonly Used Port [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1092 Communication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #1: Connection Proxy [macos, linux]
|
||||
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1024 Custom Cryptographic Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1132 Data Encoding](./T1132/T1132.md)
|
||||
- Atomic Test #1: Base64 Encoded data. [macos, linux]
|
||||
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1172 Domain Fronting [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1483 Domain Generation Algorithms [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1104 Multi-Stage Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1188 Multi-hop Proxy [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1026 Multiband Communication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1079 Multilayer Encryption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1219 Remote Access Tools](./T1219/T1219.md)
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
|
||||
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #3: scp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
|
||||
- [T1071 Standard Application Layer Protocol](./T1071/T1071.md)
|
||||
- Atomic Test #3: Malicious User Agents - Nix [linux, macos]
|
||||
- [T1032 Standard Cryptographic Protocol](./T1032/T1032.md)
|
||||
- [T1095 Standard Non-Application Layer Protocol](./T1095/T1095.md)
|
||||
- [T1065 Uncommonly Used Port](./T1065/T1065.md)
|
||||
- Atomic Test #2: Testing usage of uncommonly used port [linux, macos]
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
|
||||
# initial-access
|
||||
- T1189 Drive-by Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1190 Exploit Public-Facing Application [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1200 Hardware Additions [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1193 Spearphishing Attachment](./T1193/T1193.md)
|
||||
- T1192 Spearphishing Link [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1194 Spearphishing via Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1195 Supply Chain Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1199 Trusted Relationship [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# privilege-escalation
|
||||
- T1068 Exploitation for Privilege Escalation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- Atomic Test #2: Shared Library Injection via /etc/ld.so.preload [linux]
|
||||
- Atomic Test #3: Shared Library Injection via LD_PRELOAD [linux]
|
||||
- [T1166 Setuid and Setgid](./T1166/T1166.md)
|
||||
- Atomic Test #1: Make and modify binary from C source [macos, linux]
|
||||
- Atomic Test #2: Set a SetUID flag on file [macos, linux]
|
||||
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
|
||||
- [T1169 Sudo](./T1169/T1169.md)
|
||||
- Atomic Test #1: Sudo usage [macos, linux]
|
||||
- [T1206 Sudo Caching](./T1206/T1206.md)
|
||||
- Atomic Test #1: Unlimited sudo cache timeout [macos, linux]
|
||||
- Atomic Test #2: Disable tty_tickets for sudo caching [macos, linux]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
|
||||
@@ -0,0 +1,375 @@
|
||||
# macOS Atomic Tests by ATT&CK Tactic & Technique
|
||||
# persistence
|
||||
- [T1156 .bash_profile and .bashrc](./T1156/T1156.md)
|
||||
- Atomic Test #1: Add command to .bash_profile [macos, linux]
|
||||
- Atomic Test #2: Add command to .bashrc [macos, linux]
|
||||
- [T1176 Browser Extensions](./T1176/T1176.md)
|
||||
- Atomic Test #1: Chrome (Developer Mode) [linux, windows, macos]
|
||||
- Atomic Test #2: Chrome (Chrome Web Store) [linux, windows, macos]
|
||||
- Atomic Test #3: Firefox [linux, windows, macos]
|
||||
- [T1136 Create Account](./T1136/T1136.md)
|
||||
- Atomic Test #2: Create a user account on a MacOS system [macos]
|
||||
- T1157 Dylib Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1519 Emond](./T1519/T1519.md)
|
||||
- Atomic Test #1: Persistance with Event Monitor - emond [macos]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
|
||||
- Atomic Test #2: Mac Hidden file [macos]
|
||||
- Atomic Test #5: Hidden files [macos]
|
||||
- Atomic Test #6: Hide a Directory [macos]
|
||||
- Atomic Test #7: Show all hidden files [macos]
|
||||
- [T1215 Kernel Modules and Extensions](./T1215/T1215.md)
|
||||
- T1161 LC_LOAD_DYLIB Addition [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1159 Launch Agent](./T1159/T1159.md)
|
||||
- Atomic Test #1: Launch Agent [macos]
|
||||
- [T1160 Launch Daemon](./T1160/T1160.md)
|
||||
- Atomic Test #1: Launch Daemon [macos]
|
||||
- [T1152 Launchctl](./T1152/T1152.md)
|
||||
- Atomic Test #1: Launchctl [macos]
|
||||
- [T1168 Local Job Scheduling](./T1168/T1168.md)
|
||||
- Atomic Test #1: Cron - Replace crontab with referenced file [macos, linux]
|
||||
- Atomic Test #2: Cron - Add script to cron folder [macos, linux]
|
||||
- Atomic Test #3: Event Monitor Daemon Persistence [macos, linux]
|
||||
- T1162 Login Item [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1037 Logon Scripts](./T1037/T1037.md)
|
||||
- Atomic Test #3: Logon Scripts - Mac [macos]
|
||||
- [T1150 Plist Modification](./T1150/T1150.md)
|
||||
- Atomic Test #1: Plist Modification [macos]
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1163 Rc.common](./T1163/T1163.md)
|
||||
- Atomic Test #1: rc.common [macos]
|
||||
- [T1164 Re-opened Applications](./T1164/T1164.md)
|
||||
- Atomic Test #1: Re-Opened Applications [macos]
|
||||
- Atomic Test #2: Re-Opened Applications [macos]
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1166 Setuid and Setgid](./T1166/T1166.md)
|
||||
- Atomic Test #1: Make and modify binary from C source [macos, linux]
|
||||
- Atomic Test #2: Set a SetUID flag on file [macos, linux]
|
||||
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
|
||||
- [T1165 Startup Items](./T1165/T1165.md)
|
||||
- Atomic Test #1: add file to Local Library StartupItems [macos]
|
||||
- [T1154 Trap](./T1154/T1154.md)
|
||||
- Atomic Test #1: Trap [macos, linux]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
|
||||
# impact
|
||||
- [T1531 Account Access Removal](./T1531/T1531.md)
|
||||
- [T1485 Data Destruction](./T1485/T1485.md)
|
||||
- Atomic Test #5: macOS/Linux - Overwrite file with DD [linux, macos]
|
||||
- T1486 Data Encrypted for Impact [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1491 Defacement [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1488 Disk Content Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1487 Disk Structure Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1499 Endpoint Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1495 Firmware Corruption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1490 Inhibit System Recovery](./T1490/T1490.md)
|
||||
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1496 Resource Hijacking](./T1496/T1496.md)
|
||||
- Atomic Test #1: macOS/Linux - Simulate CPU Load with Yes [macos, linux]
|
||||
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1492 Stored Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1529 System Shutdown/Reboot](./T1529/T1529.md)
|
||||
- Atomic Test #3: Restart System via `shutdown` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #4: Shutdown System via `shutdown` - macOS/Linux [macos, linux]
|
||||
- Atomic Test #5: Restart System via `reboot` - macOS/Linux [macos, linux]
|
||||
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# discovery
|
||||
- [T1087 Account Discovery](./T1087/T1087.md)
|
||||
- Atomic Test #1: Enumerate all accounts [linux, macos]
|
||||
- Atomic Test #2: View sudoers access [linux, macos]
|
||||
- Atomic Test #3: View accounts with UID 0 [linux, macos]
|
||||
- Atomic Test #4: List opened files by user [linux, macos]
|
||||
- Atomic Test #6: Enumerate users and groups [linux, macos]
|
||||
- Atomic Test #7: Enumerate users and groups [macos]
|
||||
- [T1010 Application Window Discovery](./T1010/T1010.md)
|
||||
- [T1217 Browser Bookmark Discovery](./T1217/T1217.md)
|
||||
- Atomic Test #2: List Mozilla Firefox Bookmark Database Files on macOS [macos]
|
||||
- Atomic Test #3: List Google Chrome Bookmark JSON Files on macOS [macos]
|
||||
- [T1083 File and Directory Discovery](./T1083/T1083.md)
|
||||
- Atomic Test #3: Nix File and Diectory Discovery [macos, linux]
|
||||
- Atomic Test #4: Nix File and Directory Discovery 2 [macos, linux]
|
||||
- [T1046 Network Service Scanning](./T1046/T1046.md)
|
||||
- Atomic Test #1: Port Scan [linux, macos]
|
||||
- Atomic Test #2: Port Scan Nmap [linux, macos]
|
||||
- [T1135 Network Share Discovery](./T1135/T1135.md)
|
||||
- Atomic Test #1: Network Share Discovery [macos, linux]
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #2: Packet Capture macOS [macos]
|
||||
- [T1201 Password Policy Discovery](./T1201/T1201.md)
|
||||
- Atomic Test #7: Examine password policy - macOS [macos]
|
||||
- T1120 Peripheral Device Discovery [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1069 Permission Groups Discovery](./T1069/T1069.md)
|
||||
- Atomic Test #1: Permission Groups Discovery [macos, linux]
|
||||
- [T1057 Process Discovery](./T1057/T1057.md)
|
||||
- Atomic Test #1: Process Discovery - ps [macos, linux]
|
||||
- [T1018 Remote System Discovery](./T1018/T1018.md)
|
||||
- Atomic Test #6: Remote System Discovery - arp nix [linux, macos]
|
||||
- Atomic Test #7: Remote System Discovery - sweep [linux, macos]
|
||||
- [T1063 Security Software Discovery](./T1063/T1063.md)
|
||||
- Atomic Test #3: Security Software Discovery - ps [linux, macos]
|
||||
- [T1518 Software Discovery](./T1518/T1518.md)
|
||||
- [T1082 System Information Discovery](./T1082/T1082.md)
|
||||
- Atomic Test #2: System Information Discovery [linux, macos]
|
||||
- Atomic Test #3: List OS Information [linux, macos]
|
||||
- Atomic Test #7: Hostname Discovery [linux, macos]
|
||||
- [T1016 System Network Configuration Discovery](./T1016/T1016.md)
|
||||
- Atomic Test #3: System Network Configuration Discovery [macos, linux]
|
||||
- [T1049 System Network Connections Discovery](./T1049/T1049.md)
|
||||
- Atomic Test #3: System Network Connections Discovery Linux & MacOS [linux, macos]
|
||||
- [T1033 System Owner/User Discovery](./T1033/T1033.md)
|
||||
- Atomic Test #2: System Owner/User Discovery [linux, macos]
|
||||
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# execution
|
||||
- [T1155 AppleScript](./T1155/T1155.md)
|
||||
- Atomic Test #1: AppleScript [macos]
|
||||
- [T1059 Command-Line Interface](./T1059/T1059.md)
|
||||
- Atomic Test #1: Command-Line Interface [macos, linux]
|
||||
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1152 Launchctl](./T1152/T1152.md)
|
||||
- Atomic Test #1: Launchctl [macos]
|
||||
- [T1168 Local Job Scheduling](./T1168/T1168.md)
|
||||
- Atomic Test #1: Cron - Replace crontab with referenced file [macos, linux]
|
||||
- Atomic Test #2: Cron - Add script to cron folder [macos, linux]
|
||||
- Atomic Test #3: Event Monitor Daemon Persistence [macos, linux]
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #1: Create and Execute Bash Shell Script [macos, linux]
|
||||
- [T1153 Source](./T1153/T1153.md)
|
||||
- Atomic Test #1: Execute Script using Source [macos, linux]
|
||||
- Atomic Test #2: Execute Script using Source Alias [macos, linux]
|
||||
- [T1151 Space after Filename](./T1151/T1151.md)
|
||||
- Atomic Test #1: Space After Filename [macos]
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1154 Trap](./T1154/T1154.md)
|
||||
- Atomic Test #1: Trap [macos, linux]
|
||||
- [T1204 User Execution](./T1204/T1204.md)
|
||||
|
||||
# lateral-movement
|
||||
- [T1155 AppleScript](./T1155/T1155.md)
|
||||
- Atomic Test #1: AppleScript [macos]
|
||||
- T1017 Application Deployment Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1210 Exploitation of Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1534 Internal Spearphishing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1037 Logon Scripts](./T1037/T1037.md)
|
||||
- Atomic Test #3: Logon Scripts - Mac [macos]
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
|
||||
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #3: scp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
|
||||
- T1021 Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1184 SSH Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# collection
|
||||
- [T1123 Audio Capture](./T1123/T1123.md)
|
||||
- [T1119 Automated Collection](./T1119/T1119.md)
|
||||
- [T1115 Clipboard Data](./T1115/T1115.md)
|
||||
- [T1074 Data Staged](./T1074/T1074.md)
|
||||
- Atomic Test #2: Stage data from Discovery.sh [linux, macos]
|
||||
- T1213 Data from Information Repositories [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1005 Data from Local System](./T1005/T1005.md)
|
||||
- Atomic Test #1: Search macOS Safari Cookies [macos]
|
||||
- T1039 Data from Network Shared Drive [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1025 Data from Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- [T1113 Screen Capture](./T1113/T1113.md)
|
||||
- Atomic Test #1: Screencapture [macos]
|
||||
- Atomic Test #2: Screencapture (silent) [macos]
|
||||
- T1125 Video Capture [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# exfiltration
|
||||
- T1020 Automated Exfiltration [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1002 Data Compressed](./T1002/T1002.md)
|
||||
- Atomic Test #3: Data Compressed - nix - zip [linux, macos]
|
||||
- Atomic Test #4: Data Compressed - nix - gzip Single File [linux, macos]
|
||||
- Atomic Test #5: Data Compressed - nix - tar Folder or File [linux, macos]
|
||||
- [T1022 Data Encrypted](./T1022/T1022.md)
|
||||
- Atomic Test #1: Data Encrypted with zip and gpg symmetric [macos, linux]
|
||||
- [T1030 Data Transfer Size Limits](./T1030/T1030.md)
|
||||
- Atomic Test #1: Data Transfer Size Limits [macos, linux]
|
||||
- [T1048 Exfiltration Over Alternative Protocol](./T1048/T1048.md)
|
||||
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux]
|
||||
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux]
|
||||
- Atomic Test #3: Exfiltration Over Alternative Protocol - HTTP [macos, linux]
|
||||
- T1041 Exfiltration Over Command and Control Channel [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1011 Exfiltration Over Other Network Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1029 Scheduled Transfer [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# credential-access
|
||||
- [T1139 Bash History](./T1139/T1139.md)
|
||||
- Atomic Test #1: Search Through Bash History [linux, macos]
|
||||
- [T1110 Brute Force](./T1110/T1110.md)
|
||||
- [T1003 Credential Dumping](./T1003/T1003.md)
|
||||
- T1503 Credentials from Web Browsers [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1081 Credentials in Files](./T1081/T1081.md)
|
||||
- Atomic Test #1: Extract Browser and System credentials with LaZagne [macos]
|
||||
- Atomic Test #2: Extract passwords with grep [macos, linux]
|
||||
- T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- [T1141 Input Prompt](./T1141/T1141.md)
|
||||
- Atomic Test #1: AppleScript - Prompt User for Password [macos]
|
||||
- [T1142 Keychain](./T1142/T1142.md)
|
||||
- Atomic Test #1: Keychain [macos]
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #2: Packet Capture macOS [macos]
|
||||
- [T1145 Private Keys](./T1145/T1145.md)
|
||||
- Atomic Test #2: Discover Private SSH Keys [macos, linux]
|
||||
- Atomic Test #4: Copy Private SSH Keys with rsync [macos, linux]
|
||||
- T1167 Securityd Memory [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1539 Steal Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1111 Two-Factor Authentication Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# defense-evasion
|
||||
- [T1009 Binary Padding](./T1009/T1009.md)
|
||||
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [macos, linux]
|
||||
- [T1146 Clear Command History](./T1146/T1146.md)
|
||||
- Atomic Test #1: Clear Bash history (rm) [linux, macos]
|
||||
- Atomic Test #2: Clear Bash history (echo) [linux, macos]
|
||||
- Atomic Test #3: Clear Bash history (cat dev/null) [linux, macos]
|
||||
- Atomic Test #4: Clear Bash history (ln dev/null) [linux, macos]
|
||||
- Atomic Test #6: Clear history of a bunch of shells [linux, macos]
|
||||
- T1116 Code Signing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1500 Compile After Delivery](./T1500/T1500.md)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #1: Connection Proxy [macos, linux]
|
||||
- [T1089 Disabling Security Tools](./T1089/T1089.md)
|
||||
- Atomic Test #5: Disable Carbon Black Response [macos]
|
||||
- Atomic Test #6: Disable LittleSnitch [macos]
|
||||
- Atomic Test #7: Disable OpenDNS Umbrella [macos]
|
||||
- T1480 Execution Guardrails [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1107 File Deletion](./T1107/T1107.md)
|
||||
- Atomic Test #1: Delete a single file - Linux/macOS [linux, macos]
|
||||
- Atomic Test #2: Delete an entire folder - Linux/macOS [linux, macos]
|
||||
- Atomic Test #14: Delete TeamViewer Log Files [windows, macos]
|
||||
- [T1222 File and Directory Permissions Modification](./T1222/T1222.md)
|
||||
- Atomic Test #8: chmod - Change file or folder mode (numeric mode) [macos, linux]
|
||||
- Atomic Test #9: chmod - Change file or folder mode (symbolic mode) [macos, linux]
|
||||
- Atomic Test #10: chmod - Change file or folder mode (numeric mode) recursively [macos, linux]
|
||||
- Atomic Test #11: chmod - Change file or folder mode (symbolic mode) recursively [macos, linux]
|
||||
- Atomic Test #12: chown - Change file or folder ownership and group [macos, linux]
|
||||
- Atomic Test #13: chown - Change file or folder ownership and group recursively [macos, linux]
|
||||
- Atomic Test #14: chown - Change file or folder mode ownership only [macos, linux]
|
||||
- Atomic Test #15: chown - Change file or folder ownership recursively [macos, linux]
|
||||
- Atomic Test #16: chattr - Remove immutable file attribute [macos, linux]
|
||||
- [T1144 Gatekeeper Bypass](./T1144/T1144.md)
|
||||
- Atomic Test #1: Gatekeeper Bypass [macos]
|
||||
- [T1148 HISTCONTROL](./T1148/T1148.md)
|
||||
- Atomic Test #1: Disable history collection [linux, macos]
|
||||
- Atomic Test #2: Mac HISTCONTROL [macos, linux]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
|
||||
- Atomic Test #2: Mac Hidden file [macos]
|
||||
- Atomic Test #5: Hidden files [macos]
|
||||
- Atomic Test #6: Hide a Directory [macos]
|
||||
- Atomic Test #7: Show all hidden files [macos]
|
||||
- [T1147 Hidden Users](./T1147/T1147.md)
|
||||
- Atomic Test #1: Hidden Users [macos]
|
||||
- [T1143 Hidden Window](./T1143/T1143.md)
|
||||
- T1066 Indicator Removal from Tools [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1070 Indicator Removal on Host](./T1070/T1070.md)
|
||||
- Atomic Test #3: rm -rf [macos, linux]
|
||||
- [T1130 Install Root Certificate](./T1130/T1130.md)
|
||||
- T1149 LC_MAIN Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1152 Launchctl](./T1152/T1152.md)
|
||||
- Atomic Test #1: Launchctl [macos]
|
||||
- [T1036 Masquerading](./T1036/T1036.md)
|
||||
- [T1027 Obfuscated Files or Information](./T1027/T1027.md)
|
||||
- Atomic Test #1: Decode base64 Data into Script [macos, linux]
|
||||
- [T1150 Plist Modification](./T1150/T1150.md)
|
||||
- Atomic Test #1: Plist Modification [macos]
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1014 Rootkit](./T1014/T1014.md)
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #1: Create and Execute Bash Shell Script [macos, linux]
|
||||
- T1045 Software Packing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1151 Space after Filename](./T1151/T1151.md)
|
||||
- Atomic Test #1: Space After Filename [macos]
|
||||
- [T1099 Timestomp](./T1099/T1099.md)
|
||||
- Atomic Test #1: Set a file's access timestamp [linux, macos]
|
||||
- Atomic Test #2: Set a file's modification timestamp [linux, macos]
|
||||
- Atomic Test #3: Set a file's creation timestamp [linux, macos]
|
||||
- Atomic Test #4: Modify file timestamps using reference file [linux, macos]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
|
||||
# command-and-control
|
||||
- T1043 Commonly Used Port [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1092 Communication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #1: Connection Proxy [macos, linux]
|
||||
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1024 Custom Cryptographic Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1132 Data Encoding](./T1132/T1132.md)
|
||||
- Atomic Test #1: Base64 Encoded data. [macos, linux]
|
||||
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1172 Domain Fronting [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1483 Domain Generation Algorithms [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1104 Multi-Stage Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1188 Multi-hop Proxy [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1026 Multiband Communication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1079 Multilayer Encryption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1205 Port Knocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1219 Remote Access Tools](./T1219/T1219.md)
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
|
||||
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #3: scp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
|
||||
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
|
||||
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
|
||||
- [T1071 Standard Application Layer Protocol](./T1071/T1071.md)
|
||||
- Atomic Test #3: Malicious User Agents - Nix [linux, macos]
|
||||
- [T1032 Standard Cryptographic Protocol](./T1032/T1032.md)
|
||||
- [T1095 Standard Non-Application Layer Protocol](./T1095/T1095.md)
|
||||
- [T1065 Uncommonly Used Port](./T1065/T1065.md)
|
||||
- Atomic Test #2: Testing usage of uncommonly used port [linux, macos]
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
|
||||
# initial-access
|
||||
- T1189 Drive-by Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1190 Exploit Public-Facing Application [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1200 Hardware Additions [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1193 Spearphishing Attachment](./T1193/T1193.md)
|
||||
- T1192 Spearphishing Link [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1194 Spearphishing via Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1195 Supply Chain Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1199 Trusted Relationship [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# privilege-escalation
|
||||
- T1157 Dylib Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1514 Elevated Execution with Prompt [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1519 Emond](./T1519/T1519.md)
|
||||
- Atomic Test #1: Persistance with Event Monitor - emond [macos]
|
||||
- T1068 Exploitation for Privilege Escalation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1160 Launch Daemon](./T1160/T1160.md)
|
||||
- Atomic Test #1: Launch Daemon [macos]
|
||||
- [T1150 Plist Modification](./T1150/T1150.md)
|
||||
- Atomic Test #1: Plist Modification [macos]
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- [T1166 Setuid and Setgid](./T1166/T1166.md)
|
||||
- Atomic Test #1: Make and modify binary from C source [macos, linux]
|
||||
- Atomic Test #2: Set a SetUID flag on file [macos, linux]
|
||||
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
|
||||
- [T1165 Startup Items](./T1165/T1165.md)
|
||||
- Atomic Test #1: add file to Local Library StartupItems [macos]
|
||||
- [T1169 Sudo](./T1169/T1169.md)
|
||||
- Atomic Test #1: Sudo usage [macos, linux]
|
||||
- [T1206 Sudo Caching](./T1206/T1206.md)
|
||||
- Atomic Test #1: Unlimited sudo cache timeout [macos, linux]
|
||||
- Atomic Test #2: Disable tty_tickets for sudo caching [macos, linux]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
|
||||
@@ -0,0 +1,765 @@
|
||||
# Windows Atomic Tests by ATT&CK Tactic & Technique
|
||||
# defense-evasion
|
||||
- T1134 Access Token Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1197 BITS Jobs](./T1197/T1197.md)
|
||||
- Atomic Test #1: Bitsadmin Download (cmd) [windows]
|
||||
- Atomic Test #2: Bitsadmin Download (PowerShell) [windows]
|
||||
- Atomic Test #3: Persist, Download, & Execute [windows]
|
||||
- [T1009 Binary Padding](./T1009/T1009.md)
|
||||
- [T1088 Bypass User Account Control](./T1088/T1088.md)
|
||||
- Atomic Test #1: Bypass UAC using Event Viewer (cmd) [windows]
|
||||
- Atomic Test #2: Bypass UAC using Event Viewer (PowerShell) [windows]
|
||||
- Atomic Test #3: Bypass UAC using Fodhelper [windows]
|
||||
- Atomic Test #4: Bypass UAC using Fodhelper - PowerShell [windows]
|
||||
- Atomic Test #5: Bypass UAC using ComputerDefaults (PowerShell) [windows]
|
||||
- Atomic Test #6: Bypass UAC by Mocking Trusted Directories [windows]
|
||||
- [T1191 CMSTP](./T1191/T1191.md)
|
||||
- Atomic Test #1: CMSTP Executing Remote Scriptlet [windows]
|
||||
- Atomic Test #2: CMSTP Executing UAC Bypass [windows]
|
||||
- T1116 Code Signing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1500 Compile After Delivery](./T1500/T1500.md)
|
||||
- Atomic Test #1: Compile After Delivery using csc.exe [windows]
|
||||
- [T1223 Compiled HTML File](./T1223/T1223.md)
|
||||
- Atomic Test #1: Compiled HTML Help Local Payload [windows]
|
||||
- Atomic Test #2: Compiled HTML Help Remote Payload [windows]
|
||||
- T1109 Component Firmware [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1122 Component Object Model Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #2: portproxy reg key [windows]
|
||||
- [T1196 Control Panel Items](./T1196/T1196.md)
|
||||
- Atomic Test #1: Control Panel Items [windows]
|
||||
- [T1207 DCShadow](./T1207/T1207.md)
|
||||
- Atomic Test #1: DCShadow - Mimikatz [windows]
|
||||
- [T1038 DLL Search Order Hijacking](./T1038/T1038.md)
|
||||
- Atomic Test #1: DLL Search Order Hijacking - amsi.dll [windows]
|
||||
- [T1073 DLL Side-Loading](./T1073/T1073.md)
|
||||
- Atomic Test #1: DLL Side-Loading using the Notepad++ GUP.exe binary [windows]
|
||||
- [T1140 Deobfuscate/Decode Files or Information](./T1140/T1140.md)
|
||||
- Atomic Test #1: Deobfuscate/Decode Files Or Information [windows]
|
||||
- Atomic Test #2: Certutil Rename and Decode [windows]
|
||||
- [T1089 Disabling Security Tools](./T1089/T1089.md)
|
||||
- Atomic Test #8: Unload Sysmon Filter Driver [windows]
|
||||
- Atomic Test #9: Disable Windows IIS HTTP Logging [windows]
|
||||
- Atomic Test #10: Uninstall Sysmon [windows]
|
||||
- Atomic Test #11: AMSI Bypass - AMSI InitFailed [windows]
|
||||
- Atomic Test #12: AMSI Bypass - Remove AMSI Provider Reg Key [windows]
|
||||
- Atomic Test #13: Disable Arbitrary Security Windows Service [windows]
|
||||
- Atomic Test #14: Disable PowerShell Script Block Logging [windows]
|
||||
- Atomic Test #15: PowerShell Bypass of AntiMalware Scripting Interface [windows]
|
||||
- Atomic Test #16: Tamper with Windows Defender ATP PowerShell [windows]
|
||||
- Atomic Test #17: Tamper with Windows Defender Command Prompt [windows]
|
||||
- Atomic Test #18: Tamper with Windows Defender Registry [windows]
|
||||
- Atomic Test #19: Disable Microft Office Security Features [windows]
|
||||
- Atomic Test #20: Remove Windows Defender Definition Files [windows]
|
||||
- T1480 Execution Guardrails [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1181 Extra Window Memory Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1107 File Deletion](./T1107/T1107.md)
|
||||
- Atomic Test #4: Delete a single file - Windows cmd [windows]
|
||||
- Atomic Test #5: Delete an entire folder - Windows cmd [windows]
|
||||
- Atomic Test #6: Delete a single file - Windows PowerShell [windows]
|
||||
- Atomic Test #7: Delete an entire folder - Windows PowerShell [windows]
|
||||
- Atomic Test #8: Delete VSS - vssadmin [windows]
|
||||
- Atomic Test #9: Delete VSS - wmic [windows]
|
||||
- Atomic Test #10: bcdedit [windows]
|
||||
- Atomic Test #11: wbadmin [windows]
|
||||
- Atomic Test #13: Delete-PrefetchFile [windows]
|
||||
- Atomic Test #14: Delete TeamViewer Log Files [windows, macos]
|
||||
- T1006 File System Logical Offsets [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1222 File and Directory Permissions Modification](./T1222/T1222.md)
|
||||
- Atomic Test #1: Take ownership using takeown utility [windows]
|
||||
- Atomic Test #2: Take ownership recursively using takeown utility [windows]
|
||||
- Atomic Test #3: cacls - Grant permission to specified user or group [windows]
|
||||
- Atomic Test #4: cacls - Grant permission to specified user or group recursively [windows]
|
||||
- Atomic Test #5: icacls - Grant permission to specified user or group [windows]
|
||||
- Atomic Test #6: icacls - Grant permission to specified user or group recursively [windows]
|
||||
- Atomic Test #7: attrib - Remove read-only attribute [windows]
|
||||
- T1484 Group Policy Modification [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #3: Create Windows System File with Attrib [windows]
|
||||
- Atomic Test #4: Create Windows Hidden File with Attrib [windows]
|
||||
- Atomic Test #8: Create ADS command prompt [windows]
|
||||
- Atomic Test #9: Create ADS PowerShell [windows]
|
||||
- [T1143 Hidden Window](./T1143/T1143.md)
|
||||
- Atomic Test #1: Hidden Window [windows]
|
||||
- [T1183 Image File Execution Options Injection](./T1183/T1183.md)
|
||||
- Atomic Test #1: IFEO Add Debugger [windows]
|
||||
- Atomic Test #2: IFEO Global Flags [windows]
|
||||
- T1054 Indicator Blocking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1066 Indicator Removal from Tools [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1070 Indicator Removal on Host](./T1070/T1070.md)
|
||||
- Atomic Test #1: Clear Logs [windows]
|
||||
- Atomic Test #2: FSUtil [windows]
|
||||
- Atomic Test #6: Delete System Logs Using PowerShell [windows]
|
||||
- Atomic Test #7: Delete System Logs Using Clear-EventLogId [windows]
|
||||
- [T1202 Indirect Command Execution](./T1202/T1202.md)
|
||||
- Atomic Test #1: Indirect Command Execution - pcalua.exe [windows]
|
||||
- Atomic Test #2: Indirect Command Execution - forfiles.exe [windows]
|
||||
- [T1130 Install Root Certificate](./T1130/T1130.md)
|
||||
- [T1118 InstallUtil](./T1118/T1118.md)
|
||||
- Atomic Test #1: CheckIfInstallable method call [windows]
|
||||
- Atomic Test #2: InstallHelper method call [windows]
|
||||
- Atomic Test #3: InstallUtil class constructor method call [windows]
|
||||
- Atomic Test #4: InstallUtil Install method call [windows]
|
||||
- Atomic Test #5: InstallUtil Uninstall method call - /U variant [windows]
|
||||
- Atomic Test #6: InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant [windows]
|
||||
- Atomic Test #7: InstallUtil HelpText method call [windows]
|
||||
- Atomic Test #8: InstallUtil evasive invocation [windows]
|
||||
- [T1036 Masquerading](./T1036/T1036.md)
|
||||
- Atomic Test #1: Masquerading as Windows LSASS process [windows]
|
||||
- Atomic Test #3: Masquerading - cscript.exe running as notepad.exe [windows]
|
||||
- Atomic Test #4: Masquerading - wscript.exe running as svchost.exe [windows]
|
||||
- Atomic Test #5: Masquerading - powershell.exe running as taskhostw.exe [windows]
|
||||
- Atomic Test #6: Masquerading - non-windows exe running as windows exe [windows]
|
||||
- Atomic Test #7: Masquerading - windows exe running as different windows exe [windows]
|
||||
- Atomic Test #8: Malicious process Masquerading as LSM.exe [windows]
|
||||
- [T1112 Modify Registry](./T1112/T1112.md)
|
||||
- Atomic Test #1: Modify Registry of Current User Profile - cmd [windows]
|
||||
- Atomic Test #2: Modify Registry of Local Machine - cmd [windows]
|
||||
- Atomic Test #3: Modify Registry of Another User Profile [windows]
|
||||
- Atomic Test #4: Modify registry to store logon credentials [windows]
|
||||
- Atomic Test #5: Modify registry to store PowerShell code [windows]
|
||||
- Atomic Test #6: Add domain to Trusted sites Zone [windows]
|
||||
- Atomic Test #7: Javascript in registry [windows]
|
||||
- [T1170 Mshta](./T1170/T1170.md)
|
||||
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Mshta calls a local VBScript file to launch notepad.exe [windows]
|
||||
- Atomic Test #3: Mshta executes VBScript to execute malicious command [windows]
|
||||
- Atomic Test #4: Mshta Executes Remote HTML Application (HTA) [windows]
|
||||
- [T1096 NTFS File Attributes](./T1096/T1096.md)
|
||||
- Atomic Test #1: Alternate Data Streams (ADS) [windows]
|
||||
- Atomic Test #2: Store file in Alternate Data Stream (ADS) [windows]
|
||||
- [T1126 Network Share Connection Removal](./T1126/T1126.md)
|
||||
- Atomic Test #1: Add Network Share [windows]
|
||||
- Atomic Test #2: Remove Network Share [windows]
|
||||
- Atomic Test #3: Remove Network Share PowerShell [windows]
|
||||
- [T1027 Obfuscated Files or Information](./T1027/T1027.md)
|
||||
- Atomic Test #2: Execute base64-encoded PowerShell [windows]
|
||||
- Atomic Test #3: Execute base64-encoded PowerShell from Windows Registry [windows]
|
||||
- [T1502 Parent PID Spoofing](./T1502/T1502.md)
|
||||
- Atomic Test #1: Parent PID Spoofing using PowerShell [windows]
|
||||
- T1186 Process Doppelgänging [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1093 Process Hollowing](./T1093/T1093.md)
|
||||
- Atomic Test #1: Process Hollowing using PowerShell [windows]
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- Atomic Test #1: Process Injection via mavinject.exe [windows]
|
||||
- Atomic Test #4: Process Injection via C# [windows]
|
||||
- Atomic Test #5: svchost writing a file to a UNC path [windows]
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1121 Regsvcs/Regasm](./T1121/T1121.md)
|
||||
- Atomic Test #1: Regasm Uninstall Method Call Test [windows]
|
||||
- Atomic Test #2: Regsvs Uninstall Method Call Test [windows]
|
||||
- [T1117 Regsvr32](./T1117/T1117.md)
|
||||
- Atomic Test #1: Regsvr32 local COM scriptlet execution [windows]
|
||||
- Atomic Test #2: Regsvr32 remote COM scriptlet execution [windows]
|
||||
- Atomic Test #3: Regsvr32 local DLL execution [windows]
|
||||
- [T1014 Rootkit](./T1014/T1014.md)
|
||||
- Atomic Test #3: Windows Signed Driver Rootkit Test [windows]
|
||||
- [T1085 Rundll32](./T1085/T1085.md)
|
||||
- Atomic Test #1: Rundll32 execute JavaScript Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Rundll32 execute VBscript command [windows]
|
||||
- Atomic Test #3: Rundll32 advpack.dll Execution [windows]
|
||||
- Atomic Test #4: Rundll32 ieadvpack.dll Execution [windows]
|
||||
- Atomic Test #5: Rundll32 syssetup.dll Execution [windows]
|
||||
- Atomic Test #6: Rundll32 setupapi.dll Execution [windows]
|
||||
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #2: Create and Execute Batch Script [windows]
|
||||
- [T1218 Signed Binary Proxy Execution](./T1218/T1218.md)
|
||||
- Atomic Test #1: mavinject - Inject DLL into running process [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer - Execute arbitrary PowerShell code [windows]
|
||||
- Atomic Test #3: Register-CimProvider - Execute evil dll [windows]
|
||||
- Atomic Test #4: Msiexec.exe - Execute Local MSI file [windows]
|
||||
- Atomic Test #5: Msiexec.exe - Execute Remote MSI file [windows]
|
||||
- Atomic Test #6: Msiexec.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #7: Odbcconf.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #8: InfDefaultInstall.exe .inf Execution [windows]
|
||||
- [T1216 Signed Script Proxy Execution](./T1216/T1216.md)
|
||||
- Atomic Test #1: PubPrn.vbs Signed Script Bypass [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer Signed Script PowerShell Command Execution [windows]
|
||||
- Atomic Test #3: manage-bde.wsf Signed Script Command Execution [windows]
|
||||
- T1045 Software Packing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1221 Template Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1099 Timestomp](./T1099/T1099.md)
|
||||
- Atomic Test #5: Windows - Modify file creation timestamp with PowerShell [windows]
|
||||
- Atomic Test #6: Windows - Modify file last modified timestamp with PowerShell [windows]
|
||||
- Atomic Test #7: Windows - Modify file last access timestamp with PowerShell [windows]
|
||||
- [T1127 Trusted Developer Utilities](./T1127/T1127.md)
|
||||
- Atomic Test #1: MSBuild Bypass Using Inline Tasks [windows]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
- Atomic Test #1: Reach out to C2 Pointer URLs via command_prompt [windows]
|
||||
- Atomic Test #2: Reach out to C2 Pointer URLs via powershell [windows]
|
||||
- [T1220 XSL Script Processing](./T1220/T1220.md)
|
||||
- Atomic Test #1: MSXSL Bypass using local files [windows]
|
||||
- Atomic Test #2: MSXSL Bypass using remote files [windows]
|
||||
- Atomic Test #3: WMIC bypass using local XSL file [windows]
|
||||
- Atomic Test #4: WMIC bypass using remote XSL file [windows]
|
||||
|
||||
# privilege-escalation
|
||||
- T1134 Access Token Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1015 Accessibility Features](./T1015/T1015.md)
|
||||
- Atomic Test #1: Attaches Command Prompt as a Debugger to a List of Target Processes [windows]
|
||||
- T1182 AppCert DLLs [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1103 AppInit DLLs](./T1103/T1103.md)
|
||||
- Atomic Test #1: Install AppInit Shim [windows]
|
||||
- [T1138 Application Shimming](./T1138/T1138.md)
|
||||
- Atomic Test #1: Application Shim Installation [windows]
|
||||
- Atomic Test #2: New shim database files created in the default shim database directory [windows]
|
||||
- Atomic Test #3: Registry key creation and/or modification events for SDB [windows]
|
||||
- [T1088 Bypass User Account Control](./T1088/T1088.md)
|
||||
- Atomic Test #1: Bypass UAC using Event Viewer (cmd) [windows]
|
||||
- Atomic Test #2: Bypass UAC using Event Viewer (PowerShell) [windows]
|
||||
- Atomic Test #3: Bypass UAC using Fodhelper [windows]
|
||||
- Atomic Test #4: Bypass UAC using Fodhelper - PowerShell [windows]
|
||||
- Atomic Test #5: Bypass UAC using ComputerDefaults (PowerShell) [windows]
|
||||
- Atomic Test #6: Bypass UAC by Mocking Trusted Directories [windows]
|
||||
- [T1038 DLL Search Order Hijacking](./T1038/T1038.md)
|
||||
- Atomic Test #1: DLL Search Order Hijacking - amsi.dll [windows]
|
||||
- T1068 Exploitation for Privilege Escalation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1181 Extra Window Memory Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1044 File System Permissions Weakness](./T1044/T1044.md)
|
||||
- Atomic Test #1: File System Permissions Weakness [windows]
|
||||
- [T1179 Hooking](./T1179/T1179.md)
|
||||
- Atomic Test #1: Hook PowerShell TLS Encrypt/Decrypt Messages [windows]
|
||||
- [T1183 Image File Execution Options Injection](./T1183/T1183.md)
|
||||
- Atomic Test #1: IFEO Add Debugger [windows]
|
||||
- Atomic Test #2: IFEO Global Flags [windows]
|
||||
- [T1050 New Service](./T1050/T1050.md)
|
||||
- Atomic Test #1: Service Installation [windows]
|
||||
- Atomic Test #2: Service Installation PowerShell [windows]
|
||||
- [T1502 Parent PID Spoofing](./T1502/T1502.md)
|
||||
- Atomic Test #1: Parent PID Spoofing using PowerShell [windows]
|
||||
- T1034 Path Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1013 Port Monitors [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1504 PowerShell Profile](./T1504/T1504.md)
|
||||
- Atomic Test #1: Append malicious start-process cmdlet [windows]
|
||||
- [T1055 Process Injection](./T1055/T1055.md)
|
||||
- Atomic Test #1: Process Injection via mavinject.exe [windows]
|
||||
- Atomic Test #4: Process Injection via C# [windows]
|
||||
- Atomic Test #5: svchost writing a file to a UNC path [windows]
|
||||
- T1178 SID-History Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1053 Scheduled Task](./T1053/T1053.md)
|
||||
- Atomic Test #1: At.exe Scheduled task [windows]
|
||||
- Atomic Test #2: Scheduled task Local [windows]
|
||||
- Atomic Test #3: Scheduled task Remote [windows]
|
||||
- Atomic Test #4: Powershell Cmdlet Scheduled Task [windows]
|
||||
- [T1058 Service Registry Permissions Weakness](./T1058/T1058.md)
|
||||
- Atomic Test #1: Service Registry Permissions Weakness [windows]
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
- Atomic Test #1: Web Shell Written to Disk [windows]
|
||||
|
||||
# persistence
|
||||
- [T1015 Accessibility Features](./T1015/T1015.md)
|
||||
- Atomic Test #1: Attaches Command Prompt as a Debugger to a List of Target Processes [windows]
|
||||
- [T1098 Account Manipulation](./T1098/T1098.md)
|
||||
- Atomic Test #1: Admin Account Manipulate [windows]
|
||||
- T1182 AppCert DLLs [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1103 AppInit DLLs](./T1103/T1103.md)
|
||||
- Atomic Test #1: Install AppInit Shim [windows]
|
||||
- [T1138 Application Shimming](./T1138/T1138.md)
|
||||
- Atomic Test #1: Application Shim Installation [windows]
|
||||
- Atomic Test #2: New shim database files created in the default shim database directory [windows]
|
||||
- Atomic Test #3: Registry key creation and/or modification events for SDB [windows]
|
||||
- T1131 Authentication Package [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1197 BITS Jobs](./T1197/T1197.md)
|
||||
- Atomic Test #1: Bitsadmin Download (cmd) [windows]
|
||||
- Atomic Test #2: Bitsadmin Download (PowerShell) [windows]
|
||||
- Atomic Test #3: Persist, Download, & Execute [windows]
|
||||
- T1067 Bootkit [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1176 Browser Extensions](./T1176/T1176.md)
|
||||
- Atomic Test #1: Chrome (Developer Mode) [linux, windows, macos]
|
||||
- Atomic Test #2: Chrome (Chrome Web Store) [linux, windows, macos]
|
||||
- Atomic Test #3: Firefox [linux, windows, macos]
|
||||
- [T1042 Change Default File Association](./T1042/T1042.md)
|
||||
- Atomic Test #1: Change Default File Association [windows]
|
||||
- T1109 Component Firmware [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1122 Component Object Model Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1136 Create Account](./T1136/T1136.md)
|
||||
- Atomic Test #3: Create a new user in a command prompt [windows]
|
||||
- Atomic Test #4: Create a new user in PowerShell [windows]
|
||||
- [T1038 DLL Search Order Hijacking](./T1038/T1038.md)
|
||||
- Atomic Test #1: DLL Search Order Hijacking - amsi.dll [windows]
|
||||
- T1133 External Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1044 File System Permissions Weakness](./T1044/T1044.md)
|
||||
- Atomic Test #1: File System Permissions Weakness [windows]
|
||||
- [T1158 Hidden Files and Directories](./T1158/T1158.md)
|
||||
- Atomic Test #3: Create Windows System File with Attrib [windows]
|
||||
- Atomic Test #4: Create Windows Hidden File with Attrib [windows]
|
||||
- Atomic Test #8: Create ADS command prompt [windows]
|
||||
- Atomic Test #9: Create ADS PowerShell [windows]
|
||||
- [T1179 Hooking](./T1179/T1179.md)
|
||||
- Atomic Test #1: Hook PowerShell TLS Encrypt/Decrypt Messages [windows]
|
||||
- [T1062 Hypervisor](./T1062/T1062.md)
|
||||
- Atomic Test #1: Installing Hyper-V Feature [windows]
|
||||
- [T1183 Image File Execution Options Injection](./T1183/T1183.md)
|
||||
- Atomic Test #1: IFEO Add Debugger [windows]
|
||||
- Atomic Test #2: IFEO Global Flags [windows]
|
||||
- T1177 LSASS Driver [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1037 Logon Scripts](./T1037/T1037.md)
|
||||
- Atomic Test #1: Logon Scripts [windows]
|
||||
- Atomic Test #2: Scheduled Task Startup Script [windows]
|
||||
- Atomic Test #4: Supicious vbs file run from startup Folder [windows]
|
||||
- Atomic Test #5: Supicious jse file run from startup Folder [windows]
|
||||
- Atomic Test #6: Supicious bat file run from startup Folder [windows]
|
||||
- [T1031 Modify Existing Service](./T1031/T1031.md)
|
||||
- Atomic Test #1: Modify Fax service to run PowerShell [windows]
|
||||
- [T1128 Netsh Helper DLL](./T1128/T1128.md)
|
||||
- Atomic Test #1: Netsh Helper DLL Registration [windows]
|
||||
- [T1050 New Service](./T1050/T1050.md)
|
||||
- Atomic Test #1: Service Installation [windows]
|
||||
- Atomic Test #2: Service Installation PowerShell [windows]
|
||||
- [T1137 Office Application Startup](./T1137/T1137.md)
|
||||
- Atomic Test #1: DDEAUTO [windows]
|
||||
- T1034 Path Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1013 Port Monitors [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1504 PowerShell Profile](./T1504/T1504.md)
|
||||
- Atomic Test #1: Append malicious start-process cmdlet [windows]
|
||||
- T1108 Redundant Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1060 Registry Run Keys / Startup Folder](./T1060/T1060.md)
|
||||
- Atomic Test #1: Reg Key Run [windows]
|
||||
- Atomic Test #2: Reg Key RunOnce [windows]
|
||||
- Atomic Test #3: PowerShell Registry RunOnce [windows]
|
||||
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1053 Scheduled Task](./T1053/T1053.md)
|
||||
- Atomic Test #1: At.exe Scheduled task [windows]
|
||||
- Atomic Test #2: Scheduled task Local [windows]
|
||||
- Atomic Test #3: Scheduled task Remote [windows]
|
||||
- Atomic Test #4: Powershell Cmdlet Scheduled Task [windows]
|
||||
- [T1180 Screensaver](./T1180/T1180.md)
|
||||
- Atomic Test #1: Set Arbitrary Binary as Screensaver [windows]
|
||||
- [T1101 Security Support Provider](./T1101/T1101.md)
|
||||
- Atomic Test #1: Modify SSP configuration in registry [windows]
|
||||
- [T1505 Server Software Component](./T1505/T1505.md)
|
||||
- Atomic Test #1: Install MS Exchange Transport Agent Persistence [windows]
|
||||
- [T1058 Service Registry Permissions Weakness](./T1058/T1058.md)
|
||||
- Atomic Test #1: Service Registry Permissions Weakness [windows]
|
||||
- [T1023 Shortcut Modification](./T1023/T1023.md)
|
||||
- Atomic Test #1: Shortcut Modification [windows]
|
||||
- Atomic Test #2: Create shortcut to cmd in startup folders [windows]
|
||||
- T1019 System Firmware [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1209 Time Providers [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1100 Web Shell](./T1100/T1100.md)
|
||||
- Atomic Test #1: Web Shell Written to Disk [windows]
|
||||
- [T1084 Windows Management Instrumentation Event Subscription](./T1084/T1084.md)
|
||||
- Atomic Test #1: Persistence [windows]
|
||||
- [T1004 Winlogon Helper DLL](./T1004/T1004.md)
|
||||
- Atomic Test #1: Winlogon Shell Key Persistence - PowerShell [windows]
|
||||
- Atomic Test #2: Winlogon Userinit Key Persistence - PowerShell [windows]
|
||||
- Atomic Test #3: Winlogon Notify Key Logon Persistence - PowerShell [windows]
|
||||
|
||||
# impact
|
||||
- [T1531 Account Access Removal](./T1531/T1531.md)
|
||||
- Atomic Test #1: Change User Password - Windows [windows]
|
||||
- Atomic Test #2: Delete User - Windows [windows]
|
||||
- [T1485 Data Destruction](./T1485/T1485.md)
|
||||
- Atomic Test #1: Windows - Delete Volume Shadow Copies [windows]
|
||||
- Atomic Test #2: Windows - Delete Windows Backup Catalog [windows]
|
||||
- Atomic Test #3: Windows - Disable Windows Recovery Console Repair [windows]
|
||||
- Atomic Test #4: Windows - Overwrite file with Sysinternals SDelete [windows]
|
||||
- Atomic Test #6: Windows - Delete Backup Files [windows]
|
||||
- T1486 Data Encrypted for Impact [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1491 Defacement [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1488 Disk Content Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1487 Disk Structure Wipe [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1499 Endpoint Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1495 Firmware Corruption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1490 Inhibit System Recovery](./T1490/T1490.md)
|
||||
- Atomic Test #1: Windows - Delete Volume Shadow Copies [windows]
|
||||
- Atomic Test #2: Windows - Delete Volume Shadow Copies via WMI [windows]
|
||||
- Atomic Test #3: Windows - Delete Windows Backup Catalog [windows]
|
||||
- Atomic Test #4: Windows - Disable Windows Recovery Console Repair [windows]
|
||||
- Atomic Test #5: Windows - Delete Volume Shadow Copies via WMI with PowerShell [windows]
|
||||
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1496 Resource Hijacking](./T1496/T1496.md)
|
||||
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1489 Service Stop](./T1489/T1489.md)
|
||||
- Atomic Test #1: Windows - Stop service using Service Controller [windows]
|
||||
- Atomic Test #2: Windows - Stop service using net.exe [windows]
|
||||
- Atomic Test #3: Windows - Stop service by killing process [windows]
|
||||
- T1492 Stored Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1529 System Shutdown/Reboot](./T1529/T1529.md)
|
||||
- Atomic Test #1: Shutdown System - Windows [windows]
|
||||
- Atomic Test #2: Restart System - Windows [windows]
|
||||
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# discovery
|
||||
- [T1087 Account Discovery](./T1087/T1087.md)
|
||||
- Atomic Test #8: Enumerate all accounts [windows]
|
||||
- Atomic Test #9: Enumerate all accounts via PowerShell [windows]
|
||||
- Atomic Test #10: Enumerate logged on users [windows]
|
||||
- Atomic Test #11: Enumerate logged on users via PowerShell [windows]
|
||||
- [T1010 Application Window Discovery](./T1010/T1010.md)
|
||||
- Atomic Test #1: List Process Main Windows - C# .NET [windows]
|
||||
- [T1217 Browser Bookmark Discovery](./T1217/T1217.md)
|
||||
- Atomic Test #4: List Google Chrome Bookmarks on Windows with powershell [windows]
|
||||
- Atomic Test #5: List Google Chrome Bookmarks on Windows with command prompt [windows]
|
||||
- [T1482 Domain Trust Discovery](./T1482/T1482.md)
|
||||
- Atomic Test #1: Windows - Discover domain trusts with dsquery [windows]
|
||||
- Atomic Test #2: Windows - Discover domain trusts with nltest [windows]
|
||||
- Atomic Test #3: Powershell enumerate domains and forests [windows]
|
||||
- [T1083 File and Directory Discovery](./T1083/T1083.md)
|
||||
- Atomic Test #1: File and Directory Discovery (cmd.exe) [windows]
|
||||
- Atomic Test #2: File and Directory Discovery (PowerShell) [windows]
|
||||
- [T1046 Network Service Scanning](./T1046/T1046.md)
|
||||
- [T1135 Network Share Discovery](./T1135/T1135.md)
|
||||
- Atomic Test #2: Network Share Discovery command prompt [windows]
|
||||
- Atomic Test #3: Network Share Discovery PowerShell [windows]
|
||||
- Atomic Test #4: View available share drives [windows]
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #3: Packet Capture Windows Command Prompt [windows]
|
||||
- Atomic Test #4: Packet Capture PowerShell [windows]
|
||||
- [T1201 Password Policy Discovery](./T1201/T1201.md)
|
||||
- Atomic Test #5: Examine local password policy - Windows [windows]
|
||||
- Atomic Test #6: Examine domain password policy - Windows [windows]
|
||||
- T1120 Peripheral Device Discovery [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1069 Permission Groups Discovery](./T1069/T1069.md)
|
||||
- Atomic Test #2: Basic Permission Groups Discovery Windows [windows]
|
||||
- Atomic Test #3: Permission Groups Discovery PowerShell [windows]
|
||||
- Atomic Test #4: Elevated group enumeration using net group [windows]
|
||||
- [T1057 Process Discovery](./T1057/T1057.md)
|
||||
- Atomic Test #2: Process Discovery - tasklist [windows]
|
||||
- [T1012 Query Registry](./T1012/T1012.md)
|
||||
- Atomic Test #1: Query Registry [windows]
|
||||
- [T1018 Remote System Discovery](./T1018/T1018.md)
|
||||
- Atomic Test #1: Remote System Discovery - net [windows]
|
||||
- Atomic Test #2: Remote System Discovery - net group Domain Computers [windows]
|
||||
- Atomic Test #3: Remote System Discovery - nltest [windows]
|
||||
- Atomic Test #4: Remote System Discovery - ping sweep [windows]
|
||||
- Atomic Test #5: Remote System Discovery - arp [windows]
|
||||
- Atomic Test #8: Remote System Discovery - nslookup [windows]
|
||||
- [T1063 Security Software Discovery](./T1063/T1063.md)
|
||||
- Atomic Test #1: Security Software Discovery [windows]
|
||||
- Atomic Test #2: Security Software Discovery - powershell [windows]
|
||||
- Atomic Test #4: Security Software Discovery - Sysmon Service [windows]
|
||||
- Atomic Test #5: Security Software Discovery - AV Discovery via WMI [windows]
|
||||
- [T1518 Software Discovery](./T1518/T1518.md)
|
||||
- Atomic Test #1: Find and Display Internet Explorer Browser Version [windows]
|
||||
- Atomic Test #2: Applications Installed [windows]
|
||||
- [T1082 System Information Discovery](./T1082/T1082.md)
|
||||
- Atomic Test #1: System Information Discovery [windows]
|
||||
- Atomic Test #6: Hostname Discovery (Windows) [windows]
|
||||
- Atomic Test #8: Windows MachineGUID Discovery [windows]
|
||||
- [T1016 System Network Configuration Discovery](./T1016/T1016.md)
|
||||
- Atomic Test #1: System Network Configuration Discovery [windows]
|
||||
- Atomic Test #2: List Windows Firewall Rules [windows]
|
||||
- Atomic Test #4: System Network Configuration Discovery (TrickBot Style) [windows]
|
||||
- Atomic Test #5: List Open Egress Ports [windows]
|
||||
- [T1049 System Network Connections Discovery](./T1049/T1049.md)
|
||||
- Atomic Test #1: System Network Connections Discovery [windows]
|
||||
- Atomic Test #2: System Network Connections Discovery with PowerShell [windows]
|
||||
- [T1033 System Owner/User Discovery](./T1033/T1033.md)
|
||||
- Atomic Test #1: System Owner/User Discovery [windows]
|
||||
- [T1007 System Service Discovery](./T1007/T1007.md)
|
||||
- Atomic Test #1: System Service Discovery [windows]
|
||||
- Atomic Test #2: System Service Discovery - net.exe [windows]
|
||||
- [T1124 System Time Discovery](./T1124/T1124.md)
|
||||
- Atomic Test #1: System Time Discovery [windows]
|
||||
- Atomic Test #2: System Time Discovery - PowerShell [windows]
|
||||
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# credential-access
|
||||
- [T1098 Account Manipulation](./T1098/T1098.md)
|
||||
- Atomic Test #1: Admin Account Manipulate [windows]
|
||||
- [T1110 Brute Force](./T1110/T1110.md)
|
||||
- Atomic Test #1: Brute Force Credentials [windows]
|
||||
- [T1003 Credential Dumping](./T1003/T1003.md)
|
||||
- Atomic Test #1: Powershell Mimikatz [windows]
|
||||
- Atomic Test #2: Gsecdump [windows]
|
||||
- Atomic Test #3: Windows Credential Editor [windows]
|
||||
- Atomic Test #4: Registry dump of SAM, creds, and secrets [windows]
|
||||
- Atomic Test #5: Dump LSASS.exe Memory using ProcDump [windows]
|
||||
- Atomic Test #6: Dump LSASS.exe Memory using Windows Task Manager [windows]
|
||||
- Atomic Test #7: Offline Credential Theft With Mimikatz [windows]
|
||||
- Atomic Test #8: Dump Active Directory Database with NTDSUtil [windows]
|
||||
- Atomic Test #9: Create Volume Shadow Copy with NTDS.dit [windows]
|
||||
- Atomic Test #10: Copy NTDS.dit from Volume Shadow Copy [windows]
|
||||
- Atomic Test #11: GPP Passwords (findstr) [windows]
|
||||
- Atomic Test #12: GPP Passwords (Get-GPPPassword) [windows]
|
||||
- Atomic Test #13: LSASS read with pypykatz [windows]
|
||||
- Atomic Test #14: Registry parse with pypykatz [windows]
|
||||
- T1503 Credentials from Web Browsers [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1081 Credentials in Files](./T1081/T1081.md)
|
||||
- Atomic Test #3: Extracting passwords with findstr [windows]
|
||||
- Atomic Test #4: Access unattend.xml [windows]
|
||||
- [T1214 Credentials in Registry](./T1214/T1214.md)
|
||||
- Atomic Test #1: Enumeration for Credentials in Registry [windows]
|
||||
- Atomic Test #2: Enumeration for PuTTY Credentials in Registry [windows]
|
||||
- T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1187 Forced Authentication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1179 Hooking](./T1179/T1179.md)
|
||||
- Atomic Test #1: Hook PowerShell TLS Encrypt/Decrypt Messages [windows]
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- Atomic Test #1: Input Capture [windows]
|
||||
- [T1141 Input Prompt](./T1141/T1141.md)
|
||||
- Atomic Test #2: PowerShell - Prompt User for Password [windows]
|
||||
- [T1208 Kerberoasting](./T1208/T1208.md)
|
||||
- Atomic Test #1: Request for service tickets [windows]
|
||||
- T1171 LLMNR/NBT-NS Poisoning and Relay [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1040 Network Sniffing](./T1040/T1040.md)
|
||||
- Atomic Test #3: Packet Capture Windows Command Prompt [windows]
|
||||
- Atomic Test #4: Packet Capture PowerShell [windows]
|
||||
- [T1174 Password Filter DLL](./T1174/T1174.md)
|
||||
- Atomic Test #1: Install and Register Password Filter DLL [windows]
|
||||
- [T1145 Private Keys](./T1145/T1145.md)
|
||||
- Atomic Test #1: Private Keys [windows]
|
||||
- T1539 Steal Web Session Cookie [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1111 Two-Factor Authentication Interception [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# lateral-movement
|
||||
- T1017 Application Deployment Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1175 Component Object Model and Distributed COM [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1210 Exploitation of Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1534 Internal Spearphishing [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1037 Logon Scripts](./T1037/T1037.md)
|
||||
- Atomic Test #1: Logon Scripts [windows]
|
||||
- Atomic Test #2: Scheduled Task Startup Script [windows]
|
||||
- Atomic Test #4: Supicious vbs file run from startup Folder [windows]
|
||||
- Atomic Test #5: Supicious jse file run from startup Folder [windows]
|
||||
- Atomic Test #6: Supicious bat file run from startup Folder [windows]
|
||||
- [T1075 Pass the Hash](./T1075/T1075.md)
|
||||
- Atomic Test #1: Mimikatz Pass the Hash [windows]
|
||||
- Atomic Test #2: crackmapexec Pass the Hash [windows]
|
||||
- [T1097 Pass the Ticket](./T1097/T1097.md)
|
||||
- Atomic Test #1: Mimikatz Kerberos Ticket Attack [windows]
|
||||
- [T1076 Remote Desktop Protocol](./T1076/T1076.md)
|
||||
- Atomic Test #1: RDP [windows]
|
||||
- Atomic Test #2: RDPto-DomainController [windows]
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #7: certutil download (urlcache) [windows]
|
||||
- Atomic Test #8: certutil download (verifyctl) [windows]
|
||||
- Atomic Test #9: Windows - BITSAdmin BITS Download [windows]
|
||||
- Atomic Test #10: Windows - PowerShell Download [windows]
|
||||
- Atomic Test #11: OSTAP Worming Activity [windows]
|
||||
- T1021 Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1091 Replication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1051 Shared Webroot [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1080 Taint Shared Content [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1077 Windows Admin Shares](./T1077/T1077.md)
|
||||
- Atomic Test #1: Map admin share [windows]
|
||||
- Atomic Test #2: Map Admin Share PowerShell [windows]
|
||||
- Atomic Test #3: Copy and Execute File with PsExec [windows]
|
||||
- Atomic Test #4: Execute command writing output to local Admin Share [windows]
|
||||
- [T1028 Windows Remote Management](./T1028/T1028.md)
|
||||
- Atomic Test #1: Enable Windows Remote Management [windows]
|
||||
- Atomic Test #2: PowerShell Lateral Movement [windows]
|
||||
- Atomic Test #3: WMIC Process Call Create [windows]
|
||||
- Atomic Test #4: Psexec [windows]
|
||||
- Atomic Test #5: Invoke-Command [windows]
|
||||
|
||||
# collection
|
||||
- [T1123 Audio Capture](./T1123/T1123.md)
|
||||
- Atomic Test #1: using device audio capture commandlet [windows]
|
||||
- [T1119 Automated Collection](./T1119/T1119.md)
|
||||
- Atomic Test #1: Automated Collection Command Prompt [windows]
|
||||
- Atomic Test #2: Automated Collection PowerShell [windows]
|
||||
- Atomic Test #3: Recon information for export with PowerShell [windows]
|
||||
- Atomic Test #4: Recon information for export with Command Prompt [windows]
|
||||
- [T1115 Clipboard Data](./T1115/T1115.md)
|
||||
- Atomic Test #1: Utilize Clipboard to store or execute commands from [windows]
|
||||
- Atomic Test #2: PowerShell [windows]
|
||||
- [T1074 Data Staged](./T1074/T1074.md)
|
||||
- Atomic Test #1: Stage data from Discovery.bat [windows]
|
||||
- Atomic Test #3: Zip a Folder with PowerShell for Staging in Temp [windows]
|
||||
- T1213 Data from Information Repositories [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1005 Data from Local System](./T1005/T1005.md)
|
||||
- T1039 Data from Network Shared Drive [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1025 Data from Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1114 Email Collection](./T1114/T1114.md)
|
||||
- Atomic Test #1: T1114 Email Collection with PowerShell [windows]
|
||||
- [T1056 Input Capture](./T1056/T1056.md)
|
||||
- Atomic Test #1: Input Capture [windows]
|
||||
- T1185 Man in the Browser [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1113 Screen Capture](./T1113/T1113.md)
|
||||
- T1125 Video Capture [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# exfiltration
|
||||
- T1020 Automated Exfiltration [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1002 Data Compressed](./T1002/T1002.md)
|
||||
- Atomic Test #1: Compress Data for Exfiltration With PowerShell [windows]
|
||||
- Atomic Test #2: Compress Data for Exfiltration With Rar [windows]
|
||||
- [T1022 Data Encrypted](./T1022/T1022.md)
|
||||
- Atomic Test #2: Compress Data and lock with password for Exfiltration with winrar [windows]
|
||||
- Atomic Test #3: Compress Data and lock with password for Exfiltration with winzip [windows]
|
||||
- Atomic Test #4: Compress Data and lock with password for Exfiltration with 7zip [windows]
|
||||
- [T1030 Data Transfer Size Limits](./T1030/T1030.md)
|
||||
- [T1048 Exfiltration Over Alternative Protocol](./T1048/T1048.md)
|
||||
- Atomic Test #4: Exfiltration Over Alternative Protocol - ICMP [windows]
|
||||
- T1041 Exfiltration Over Command and Control Channel [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1011 Exfiltration Over Other Network Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1029 Scheduled Transfer [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
# execution
|
||||
- [T1191 CMSTP](./T1191/T1191.md)
|
||||
- Atomic Test #1: CMSTP Executing Remote Scriptlet [windows]
|
||||
- Atomic Test #2: CMSTP Executing UAC Bypass [windows]
|
||||
- [T1059 Command-Line Interface](./T1059/T1059.md)
|
||||
- [T1223 Compiled HTML File](./T1223/T1223.md)
|
||||
- Atomic Test #1: Compiled HTML Help Local Payload [windows]
|
||||
- Atomic Test #2: Compiled HTML Help Remote Payload [windows]
|
||||
- T1175 Component Object Model and Distributed COM [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1196 Control Panel Items](./T1196/T1196.md)
|
||||
- Atomic Test #1: Control Panel Items [windows]
|
||||
- [T1173 Dynamic Data Exchange](./T1173/T1173.md)
|
||||
- Atomic Test #1: Execute Commands [windows]
|
||||
- Atomic Test #2: Execute PowerShell script via Word DDE [windows]
|
||||
- T1106 Execution through API [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1129 Execution through Module Load [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1118 InstallUtil](./T1118/T1118.md)
|
||||
- Atomic Test #1: CheckIfInstallable method call [windows]
|
||||
- Atomic Test #2: InstallHelper method call [windows]
|
||||
- Atomic Test #3: InstallUtil class constructor method call [windows]
|
||||
- Atomic Test #4: InstallUtil Install method call [windows]
|
||||
- Atomic Test #5: InstallUtil Uninstall method call - /U variant [windows]
|
||||
- Atomic Test #6: InstallUtil Uninstall method call - '/installtype=notransaction /action=uninstall' variant [windows]
|
||||
- Atomic Test #7: InstallUtil HelpText method call [windows]
|
||||
- Atomic Test #8: InstallUtil evasive invocation [windows]
|
||||
- T1177 LSASS Driver [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1170 Mshta](./T1170/T1170.md)
|
||||
- Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Mshta calls a local VBScript file to launch notepad.exe [windows]
|
||||
- Atomic Test #3: Mshta executes VBScript to execute malicious command [windows]
|
||||
- Atomic Test #4: Mshta Executes Remote HTML Application (HTA) [windows]
|
||||
- [T1086 PowerShell](./T1086/T1086.md)
|
||||
- Atomic Test #1: Mimikatz [windows]
|
||||
- Atomic Test #2: BloodHound [windows]
|
||||
- Atomic Test #3: Obfuscation Tests [windows]
|
||||
- Atomic Test #4: Mimikatz - Cradlecraft PsSendKeys [windows]
|
||||
- Atomic Test #5: Invoke-AppPathBypass [windows]
|
||||
- Atomic Test #6: PowerShell Add User [windows]
|
||||
- Atomic Test #7: Powershell MsXml COM object - no prompt [windows]
|
||||
- Atomic Test #8: Powershell MsXml COM object - with prompt [windows]
|
||||
- Atomic Test #9: Powershell XML requests [windows]
|
||||
- Atomic Test #10: Powershell invoke mshta.exe download [windows]
|
||||
- Atomic Test #11: Powershell Invoke-DownloadCradle [windows]
|
||||
- Atomic Test #12: PowerShell Fileless Script Execution [windows]
|
||||
- Atomic Test #13: PowerShell Downgrade Attack [windows]
|
||||
- Atomic Test #14: NTFS Alternate Data Stream Access [windows]
|
||||
- [T1121 Regsvcs/Regasm](./T1121/T1121.md)
|
||||
- Atomic Test #1: Regasm Uninstall Method Call Test [windows]
|
||||
- Atomic Test #2: Regsvs Uninstall Method Call Test [windows]
|
||||
- [T1117 Regsvr32](./T1117/T1117.md)
|
||||
- Atomic Test #1: Regsvr32 local COM scriptlet execution [windows]
|
||||
- Atomic Test #2: Regsvr32 remote COM scriptlet execution [windows]
|
||||
- Atomic Test #3: Regsvr32 local DLL execution [windows]
|
||||
- [T1085 Rundll32](./T1085/T1085.md)
|
||||
- Atomic Test #1: Rundll32 execute JavaScript Remote Payload With GetObject [windows]
|
||||
- Atomic Test #2: Rundll32 execute VBscript command [windows]
|
||||
- Atomic Test #3: Rundll32 advpack.dll Execution [windows]
|
||||
- Atomic Test #4: Rundll32 ieadvpack.dll Execution [windows]
|
||||
- Atomic Test #5: Rundll32 syssetup.dll Execution [windows]
|
||||
- Atomic Test #6: Rundll32 setupapi.dll Execution [windows]
|
||||
- [T1053 Scheduled Task](./T1053/T1053.md)
|
||||
- Atomic Test #1: At.exe Scheduled task [windows]
|
||||
- Atomic Test #2: Scheduled task Local [windows]
|
||||
- Atomic Test #3: Scheduled task Remote [windows]
|
||||
- Atomic Test #4: Powershell Cmdlet Scheduled Task [windows]
|
||||
- [T1064 Scripting](./T1064/T1064.md)
|
||||
- Atomic Test #2: Create and Execute Batch Script [windows]
|
||||
- [T1035 Service Execution](./T1035/T1035.md)
|
||||
- Atomic Test #1: Execute a Command as a Service [windows]
|
||||
- Atomic Test #2: Use PsExec to execute a command on a remote host [windows]
|
||||
- [T1218 Signed Binary Proxy Execution](./T1218/T1218.md)
|
||||
- Atomic Test #1: mavinject - Inject DLL into running process [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer - Execute arbitrary PowerShell code [windows]
|
||||
- Atomic Test #3: Register-CimProvider - Execute evil dll [windows]
|
||||
- Atomic Test #4: Msiexec.exe - Execute Local MSI file [windows]
|
||||
- Atomic Test #5: Msiexec.exe - Execute Remote MSI file [windows]
|
||||
- Atomic Test #6: Msiexec.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #7: Odbcconf.exe - Execute Arbitrary DLL [windows]
|
||||
- Atomic Test #8: InfDefaultInstall.exe .inf Execution [windows]
|
||||
- [T1216 Signed Script Proxy Execution](./T1216/T1216.md)
|
||||
- Atomic Test #1: PubPrn.vbs Signed Script Bypass [windows]
|
||||
- Atomic Test #2: SyncAppvPublishingServer Signed Script PowerShell Command Execution [windows]
|
||||
- Atomic Test #3: manage-bde.wsf Signed Script Command Execution [windows]
|
||||
- T1072 Third-party Software [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1127 Trusted Developer Utilities](./T1127/T1127.md)
|
||||
- Atomic Test #1: MSBuild Bypass Using Inline Tasks [windows]
|
||||
- [T1204 User Execution](./T1204/T1204.md)
|
||||
- Atomic Test #1: OSTap Style Macro Execution [windows]
|
||||
- Atomic Test #2: Maldoc choice flags command execution [windows]
|
||||
- Atomic Test #3: OSTAP JS version [windows]
|
||||
- [T1047 Windows Management Instrumentation](./T1047/T1047.md)
|
||||
- Atomic Test #1: WMI Reconnaissance Users [windows]
|
||||
- Atomic Test #2: WMI Reconnaissance Processes [windows]
|
||||
- Atomic Test #3: WMI Reconnaissance Software [windows]
|
||||
- Atomic Test #4: WMI Reconnaissance List Remote Services [windows]
|
||||
- Atomic Test #5: WMI Execute Local Process [windows]
|
||||
- Atomic Test #6: WMI Execute Remote Process [windows]
|
||||
- [T1028 Windows Remote Management](./T1028/T1028.md)
|
||||
- Atomic Test #1: Enable Windows Remote Management [windows]
|
||||
- Atomic Test #2: PowerShell Lateral Movement [windows]
|
||||
- Atomic Test #3: WMIC Process Call Create [windows]
|
||||
- Atomic Test #4: Psexec [windows]
|
||||
- Atomic Test #5: Invoke-Command [windows]
|
||||
- [T1220 XSL Script Processing](./T1220/T1220.md)
|
||||
- Atomic Test #1: MSXSL Bypass using local files [windows]
|
||||
- Atomic Test #2: MSXSL Bypass using remote files [windows]
|
||||
- Atomic Test #3: WMIC bypass using local XSL file [windows]
|
||||
- Atomic Test #4: WMIC bypass using remote XSL file [windows]
|
||||
|
||||
# command-and-control
|
||||
- T1043 Commonly Used Port [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1092 Communication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1090 Connection Proxy](./T1090/T1090.md)
|
||||
- Atomic Test #2: portproxy reg key [windows]
|
||||
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1024 Custom Cryptographic Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1132 Data Encoding](./T1132/T1132.md)
|
||||
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1172 Domain Fronting [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1483 Domain Generation Algorithms [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1104 Multi-Stage Channels [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1188 Multi-hop Proxy [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1026 Multiband Communication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1079 Multilayer Encryption [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1219 Remote Access Tools](./T1219/T1219.md)
|
||||
- Atomic Test #1: TeamViewer Files Detected Test on Windows [windows]
|
||||
- [T1105 Remote File Copy](./T1105/T1105.md)
|
||||
- Atomic Test #7: certutil download (urlcache) [windows]
|
||||
- Atomic Test #8: certutil download (verifyctl) [windows]
|
||||
- Atomic Test #9: Windows - BITSAdmin BITS Download [windows]
|
||||
- Atomic Test #10: Windows - PowerShell Download [windows]
|
||||
- Atomic Test #11: OSTAP Worming Activity [windows]
|
||||
- [T1071 Standard Application Layer Protocol](./T1071/T1071.md)
|
||||
- Atomic Test #1: Malicious User Agents - Powershell [windows]
|
||||
- Atomic Test #2: Malicious User Agents - CMD [windows]
|
||||
- Atomic Test #4: DNS Large Query Volume [windows]
|
||||
- Atomic Test #5: DNS Regular Beaconing [windows]
|
||||
- Atomic Test #6: DNS Long Domain Query [windows]
|
||||
- Atomic Test #7: DNS C2 [windows]
|
||||
- Atomic Test #8: OSTap Payload Download [windows]
|
||||
- [T1032 Standard Cryptographic Protocol](./T1032/T1032.md)
|
||||
- Atomic Test #1: OpenSSL C2 [windows]
|
||||
- [T1095 Standard Non-Application Layer Protocol](./T1095/T1095.md)
|
||||
- Atomic Test #1: ICMP C2 [windows]
|
||||
- Atomic Test #2: Netcat C2 [windows]
|
||||
- Atomic Test #3: Powercat C2 [windows]
|
||||
- [T1065 Uncommonly Used Port](./T1065/T1065.md)
|
||||
- Atomic Test #1: Testing usage of uncommonly used port with PowerShell [windows]
|
||||
- [T1102 Web Service](./T1102/T1102.md)
|
||||
- Atomic Test #1: Reach out to C2 Pointer URLs via command_prompt [windows]
|
||||
- Atomic Test #2: Reach out to C2 Pointer URLs via powershell [windows]
|
||||
|
||||
# initial-access
|
||||
- T1189 Drive-by Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1190 Exploit Public-Facing Application [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1133 External Remote Services [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1200 Hardware Additions [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1091 Replication Through Removable Media [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- [T1193 Spearphishing Attachment](./T1193/T1193.md)
|
||||
- Atomic Test #1: Download Phishing Attachment - VBScript [windows]
|
||||
- T1192 Spearphishing Link [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1194 Spearphishing via Service [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1195 Supply Chain Compromise [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1199 Trusted Relationship [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
+87
-30
@@ -4,6 +4,7 @@ require 'erb'
|
||||
require 'fileutils'
|
||||
require 'json'
|
||||
require 'atomic_red_team'
|
||||
require 'csv'
|
||||
|
||||
class AtomicRedTeamDocs
|
||||
ATTACK_API = Attack.new
|
||||
@@ -32,18 +33,26 @@ class AtomicRedTeamDocs
|
||||
end
|
||||
puts
|
||||
puts "Generated docs for #{oks.count} techniques, #{fails.count} failures"
|
||||
generate_attack_matrix! 'All', "#{File.dirname(File.dirname(__FILE__))}/atomics/matrix.md"
|
||||
generate_attack_matrix! 'Windows', "#{File.dirname(File.dirname(__FILE__))}/atomics/windows-matrix.md", only_platform: /windows/
|
||||
generate_attack_matrix! 'macOS', "#{File.dirname(File.dirname(__FILE__))}/atomics/macos-matrix.md", only_platform: /macos/
|
||||
generate_attack_matrix! 'Linux', "#{File.dirname(File.dirname(__FILE__))}/atomics/linux-matrix.md", only_platform: /^(?!windows|macos).*$/
|
||||
generate_attack_matrix! 'All', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Matrices/matrix.md"
|
||||
generate_attack_matrix! 'Windows', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Matrices/windows-matrix.md", only_platform: /windows/
|
||||
generate_attack_matrix! 'macOS', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Matrices/macos-matrix.md", only_platform: /macos/
|
||||
generate_attack_matrix! 'Linux', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Matrices/linux-matrix.md", only_platform: /^(?!windows|macos).*$/
|
||||
|
||||
generate_index! 'All', "#{File.dirname(File.dirname(__FILE__))}/atomics/index.md"
|
||||
generate_index! 'Windows', "#{File.dirname(File.dirname(__FILE__))}/atomics/windows-index.md", only_platform: /windows/
|
||||
generate_index! 'macOS', "#{File.dirname(File.dirname(__FILE__))}/atomics/macos-index.md", only_platform: /macos/
|
||||
generate_index! 'Linux', "#{File.dirname(File.dirname(__FILE__))}/atomics/linux-index.md", only_platform: /^(?!windows|macos).*$/
|
||||
generate_index! 'All', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-Markdown/index.md"
|
||||
generate_index! 'Windows', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-Markdown/windows-index.md", only_platform: /windows/
|
||||
generate_index! 'macOS', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-Markdown/macos-index.md", only_platform: /macos/
|
||||
generate_index! 'Linux', "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-Markdown/linux-index.md", only_platform: /^(?!windows|macos).*$/
|
||||
|
||||
generate_yaml_index! "#{File.dirname(File.dirname(__FILE__))}/atomics/index.yaml"
|
||||
generate_navigator_layer! "#{File.dirname(File.dirname(__FILE__))}/atomics/art_navigator_layer.json"
|
||||
generate_index_csv! "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-CSV/index.csv"
|
||||
generate_index_csv! "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-CSV/windows-index.csv", only_platform: /windows/
|
||||
generate_index_csv! "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-CSV/macos-index.csv", only_platform: /macos/
|
||||
generate_index_csv! "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Indexes-CSV/linux-index.csv", only_platform: /^(?!windows|macos).*$/
|
||||
|
||||
generate_yaml_index! "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/index.yaml"
|
||||
generate_navigator_layer! "#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Attack-Navigator-Layers/art-navigator-layer.json", \
|
||||
"#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Attack-Navigator-Layers/art-navigator-layer-windows.json", \
|
||||
"#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Attack-Navigator-Layers/art-navigator-layer-macos.json", \
|
||||
"#{File.dirname(File.dirname(__FILE__))}/atomics/Indexes/Attack-Navigator-Layers/art-navigator-layer-linux.json"
|
||||
|
||||
return oks, fails
|
||||
end
|
||||
@@ -126,6 +135,28 @@ class AtomicRedTeamDocs
|
||||
puts "Generated Atomic Red Team index at #{output_doc_path}"
|
||||
end
|
||||
|
||||
|
||||
#
|
||||
# Generates a master Markdown index of ATT&CK Tactic -> Technique -> Atomic Tests
|
||||
#
|
||||
def generate_index_csv!(output_doc_path_by_tactic, only_platform: /.*/)
|
||||
rows = Array.new
|
||||
rows << ["Tactic", "Technique #", "Test #", "Test Name"]
|
||||
|
||||
ATTACK_API.techniques_by_tactic(only_platform: only_platform).each do |tactic, techniques|
|
||||
techniques.each do |technique|
|
||||
ATOMIC_RED_TEAM.atomic_tests_for_technique(technique).each_with_index do |atomic_test, i|
|
||||
next unless atomic_test['supported_platforms'].any? {|platform| platform.downcase =~ only_platform}
|
||||
rows << [tactic, technique['identifier'], i+1, atomic_test['name']]
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
File.write(output_doc_path_by_tactic, rows.map(&:to_csv).join)
|
||||
|
||||
puts "Generated Atomic Red Team CSV indexes at #{output_doc_path_by_tactic}"
|
||||
end
|
||||
|
||||
#
|
||||
# Generates a master YAML index of ATT&CK Tactic -> Technique -> Atomic Tests
|
||||
#
|
||||
@@ -149,24 +180,7 @@ class AtomicRedTeamDocs
|
||||
puts "Generated Atomic Red Team YAML index at #{output_doc_path}"
|
||||
end
|
||||
|
||||
#
|
||||
# Generates a MITRE ATT&CK Navigator Layer based on contributed techniques
|
||||
#
|
||||
def generate_navigator_layer!(output_layer_path)
|
||||
|
||||
techniques = []
|
||||
|
||||
ATOMIC_RED_TEAM.atomic_tests.each do |atomic_yaml|
|
||||
begin
|
||||
technique = {
|
||||
"techniqueID" => atomic_yaml['attack_technique'],
|
||||
"score" => 100,
|
||||
"enabled" => true
|
||||
}
|
||||
|
||||
techniques.push(technique)
|
||||
end
|
||||
|
||||
def get_layer(techniques)
|
||||
layer = {
|
||||
"version" => "2.2",
|
||||
"name" => "Atomic Red Team",
|
||||
@@ -183,11 +197,54 @@ class AtomicRedTeamDocs
|
||||
],
|
||||
"techniques" => techniques
|
||||
}
|
||||
end
|
||||
#
|
||||
# Generates a MITRE ATT&CK Navigator Layer based on contributed techniques
|
||||
#
|
||||
def generate_navigator_layer!(output_layer_path, output_layer_path_win, output_layer_path_mac, output_layer_path_lin)
|
||||
|
||||
File.write output_layer_path,layer.to_json
|
||||
techniques = []
|
||||
techniques_win = []
|
||||
techniques_mac = []
|
||||
techniques_lin = []
|
||||
|
||||
ATOMIC_RED_TEAM.atomic_tests.each do |atomic_yaml|
|
||||
begin
|
||||
technique = {
|
||||
"techniqueID" => atomic_yaml['attack_technique'],
|
||||
"score" => 100,
|
||||
"enabled" => true
|
||||
}
|
||||
|
||||
techniques.push(technique)
|
||||
has_windows_tests = false
|
||||
has_macos_tests = false
|
||||
has_linux_tests = false
|
||||
atomic_yaml['atomic_tests'].each do |atomic|
|
||||
if atomic['supported_platforms'].any? {|platform| platform.downcase =~ /windows/} then has_windows_tests = true end
|
||||
if atomic['supported_platforms'].any? {|platform| platform.downcase =~ /macos/} then has_macos_tests = true end
|
||||
if atomic['supported_platforms'].any? {|platform| platform.downcase =~ /^(?!windows|macos).*$/} then has_linux_tests = true end
|
||||
end
|
||||
if has_windows_tests then techniques_win.push(technique) end
|
||||
if has_macos_tests then techniques_mac.push(technique) end
|
||||
if has_linux_tests then techniques_lin.push(technique) end
|
||||
end
|
||||
end
|
||||
|
||||
puts "Generated Atomic Red Team ATT&CK Navigator Layer at #{output_layer_path}"
|
||||
layer = get_layer techniques
|
||||
layer_win = get_layer techniques_win
|
||||
layer_mac = get_layer techniques_mac
|
||||
layer_lin = get_layer techniques_lin
|
||||
|
||||
File.write output_layer_path,layer.to_json
|
||||
File.write output_layer_path_win,layer_win.to_json
|
||||
File.write output_layer_path_mac,layer_mac.to_json
|
||||
File.write output_layer_path_lin,layer_lin.to_json
|
||||
|
||||
puts "Generated Atomic Red Team ATT&CK Navigator Layers at #{output_layer_path}"
|
||||
puts "Generated Atomic Red Team ATT&CK Navigator Layers at #{output_layer_path_win}"
|
||||
puts "Generated Atomic Red Team ATT&CK Navigator Layers at #{output_layer_path_mac}"
|
||||
puts "Generated Atomic Red Team ATT&CK Navigator Layers at #{output_layer_path_lin}"
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
$(document).ready(function () {
|
||||
$.get("https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/index.yaml", function (data) {
|
||||
$.get("https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/Indexes/index.yaml", function (data) {
|
||||
window.atomic_index = jsyaml.safeLoad(data);
|
||||
});
|
||||
|
||||
|
||||
+5
-5
@@ -29,11 +29,11 @@ execute all the Discovery phase items at once in a batch file, or run each phase
|
||||
Select one or more Atomic Tests that you plan to execute. A complete list, ATT&CK matrices, and platform-specific
|
||||
matrices linking to Atomic Tests can be found here:
|
||||
|
||||
- [Complete list of Atomic Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/index.md)
|
||||
- [Atomic Tests per the ATT&CK Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/matrix.md)
|
||||
- Windows [Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/windows-index.md) and [Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/windows-matrix.md)
|
||||
- macOS [Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/macos-index.md) and [Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/macos-matrix.md)
|
||||
- Linux [Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/linux-index.md) and [Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/linux-matrix.md)
|
||||
- [Complete list of Atomic Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes-Markdown/index.md)
|
||||
- [Atomic Tests per the ATT&CK Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Matrices/matrix.md)
|
||||
- Windows [Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes-Markdown/windows-index.md) and [Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Matrices/windows-matrix.md)
|
||||
- macOS [Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes-Markdown/macos-index.md) and [Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Matrices/macos-matrix.md)
|
||||
- Linux [Tests](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes-Markdown/linux-index.md) and [Matrix](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Matrices/linux-matrix.md)
|
||||
|
||||
## Execute Test
|
||||
|
||||
|
||||
Reference in New Issue
Block a user