Files
2022-02-03 17:54:53 +00:00

33 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2credential-accessT1003.008/etc/passwd and /etc/shadow1Access /etc/shadow (Local)3723ab77-c546-403c-8fb4-bb577033b235bash
3credential-accessT1003.008/etc/passwd and /etc/shadow2Access /etc/passwd (Local)60e860b6-8ae6-49db-ad07-5e73edd88f5dsh
4credential-accessT1003.008/etc/passwd and /etc/shadow3Access /etc/{shadow,passwd} with a standard bin that's not catdf1a55ae-019d-4120-bc35-94f4bc5c4b0abash
5credential-accessT1003.008/etc/passwd and /etc/shadow4Access /etc/{shadow,passwd} with shell builtinsf5aa6543-6cb2-4fae-b9c2-b96e14721713bash
6credential-accessT1552.003Bash History1Search Through Bash History3cfde62b-7c33-4b26-a61e-755d6131c8cesh
7credential-accessT1552.007Container API1ListSecrets43c3a49d-d15c-45e6-b303-f6e177e44a9abash
8credential-accessT1552.007Container API2Cat the contents of a Kubernetes service account token file788e0019-a483-45da-bcfe-96353d46820fsh
9credential-accessT1110.004Credential Stuffing1SSH Credential Stuffing From Linux4f08197a-2a8a-472d-9589-cd2895ef22adbash
10credential-accessT1552.001Credentials In Files2Extract passwords with grepbd4cf0d1-7646-474e-8610-78ccf5a097c4sh
11credential-accessT1552.001Credentials In Files5Find and Access Github Credentialsda4f751a-020b-40d7-b9ff-d433b7799803bash
12credential-accessT1056.001Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
13credential-accessT1056.001Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
14credential-accessT1056.001Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
15credential-accessT1056.001Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
16credential-accessT1056.001Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
17credential-accessT1040Network Sniffing1Packet Capture Linux7fe741f7-b265-4951-a7c7-320889083b3ebash
18credential-accessT1110.001Password Guessing3Brute Force Credentials of single Azure AD user5a51ef57-299e-4d62-8e11-2d440df55e69powershell
19credential-accessT1110.001Password Guessing4SUDO brute force Debian464b63e8-bf1f-422e-9e2c-2aa5080b6f9ash
20credential-accessT1110.001Password Guessing5SUDO brute force Redhatb72958a7-53e3-4809-9ee1-58f6ecd99adesh
21credential-accessT1110.003Password Spraying4Password spray all Azure AD users with a single passworda8aa2d3e-1c52-4016-bc73-0f8854cfa80apowershell
22credential-accessT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
23credential-accessT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
24credential-accessT1552.004Private Keys2Discover Private SSH Keys46959285-906d-40fa-9437-5a439accd878sh
25credential-accessT1552.004Private Keys3Copy Private SSH Keys with CP7c247dc7-5128-4643-907b-73a76d9135c3sh
26credential-accessT1552.004Private Keys4Copy Private SSH Keys with rsync864bb0b2-6bb5-489a-b43b-a77b3a16d68ash
27credential-accessT1552.004Private Keys5Copy the users GnuPG directory with rsync2a5a0601-f5fb-4e2e-aa09-73282ae6afcash
28credential-accessT1003.007Proc Filesystem1Dump individual process memory with sh (Local)7e91138a-8e74-456d-a007-973d67a0bb80sh
29credential-accessT1003.007Proc Filesystem2Dump individual process memory with Python (Local)437b2003-a20d-4ed8-834c-4964f24eec63sh
30credential-accessT1606.002SAML Tokens1Golden SAMLb16a03bc-1089-4dcc-ad98-30fe8f3a2b31powershell
31collectionT1560.002Archive via Library1Compressing data using GZip in Python (Linux)391f5298-b12d-4636-8482-35d9c17d53a8bash
32collectionT1560.002Archive via Library2Compressing data using bz2 in Python (Linux)c75612b2-9de0-4d7c-879c-10d7b077072dbash
33collectionT1560.002Archive via Library3Compressing data using zipfile in Python (Linux)001a042b-859f-44d9-bf81-fd1c4e2200b0bash
34collectionT1560.002Archive via Library4Compressing data using tarfile in Python (Linux)e86f1b4b-fcc1-4a2a-ae10-b49da01458dbbash
35collectionT1560.001Archive via Utility5Data Compressed - nix - zipc51cec55-28dd-4ad2-9461-1eacbc82c3a0sh
36collectionT1560.001Archive via Utility6Data Compressed - nix - gzip Single Filecde3c2af-3485-49eb-9c1f-0ed60e9cc0afsh
37collectionT1560.001Archive via Utility7Data Compressed - nix - tar Folder or File7af2b51e-ad1c-498c-aca8-d3290c19535ash
38collectionT1560.001Archive via Utility8Data Encrypted with zip and gpg symmetric0286eb44-e7ce-41a0-b109-3da516e05a5fsh
39collectionT1056.001Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
40collectionT1056.001Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
41collectionT1056.001Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
42collectionT1056.001Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
43collectionT1056.001Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
44collectionT1074.001Local Data Staging2Stage data from Discovery.sh39ce0303-ae16-4b9e-bb5b-4f53e8262066bash
45collectionT1113Screen Capture3X Windows Capture8206dd0c-faf6-4d74-ba13-7fbe13dce6acbash
46collectionT1113Screen Capture4Capture Linux Desktop using Import Tool9cd1cccb-91e4-4550-9139-e20a586fcea1bash
47privilege-escalationT1053.001At (Linux)1At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
48privilege-escalationT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
49privilege-escalationT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
50privilege-escalationT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
51privilege-escalationT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
52privilege-escalationT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
53privilege-escalationT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
54privilege-escalationT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
55privilege-escalationT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
56privilege-escalationT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
57privilege-escalationT1611Escape to Host1Deploy container using nsenter container escape0b2f9520-a17a-4671-9dba-3bd034099fffsh
58privilege-escalationT1547.006Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
59privilege-escalationT1037.004RC Scripts2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
60privilege-escalationT1037.004RC Scripts3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
61privilege-escalationT1548.001Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
62privilege-escalationT1548.001Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
63privilege-escalationT1548.001Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
64privilege-escalationT1548.001Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
65privilege-escalationT1548.001Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
66privilege-escalationT1548.003Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
67privilege-escalationT1548.003Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
68privilege-escalationT1548.003Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
69privilege-escalationT1543.002Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
70privilege-escalationT1543.002Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
71privilege-escalationT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
72privilege-escalationT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
73privilege-escalationT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
74privilege-escalationT1546.005Trap1Trapa74b2e07-5952-4c03-8b56-56274b076b61sh
75privilege-escalationT1546.004Unix Shell Configuration Modification1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
76privilege-escalationT1546.004Unix Shell Configuration Modification2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
77defense-evasionT1027.001Binary Padding1Pad Binary to Change Hash - Linux/macOS ddffe2346c-abd5-4b45-a713-bf5f1ebd573ash
78defense-evasionT1070.003Clear Command History1Clear Bash history (rm)a934276e-2be5-4a36-93fd-98adbb5bd4fcsh
79defense-evasionT1070.003Clear Command History2Clear Bash history (echo)cbf506a5-dd78-43e5-be7e-a46b7c7a0a11sh
80defense-evasionT1070.003Clear Command History3Clear Bash history (cat dev/null)b1251c35-dcd3-4ea1-86da-36d27b54f31fsh
81defense-evasionT1070.003Clear Command History4Clear Bash history (ln dev/null)23d348f3-cc5c-4ba9-bd0a-ae09069f0914sh
82defense-evasionT1070.003Clear Command History5Clear Bash history (truncate)47966a1d-df4f-4078-af65-db6d9aa20739sh
83defense-evasionT1070.003Clear Command History6Clear history of a bunch of shells7e6721df-5f08-4370-9255-f06d8a77af4csh
84defense-evasionT1070.003Clear Command History7Clear and Disable Bash History Logging784e4011-bd1a-4ecd-a63a-8feb278512e6sh
85defense-evasionT1070.003Clear Command History8Use Space Before Command to Avoid Logging to History53b03a54-4529-4992-852d-a00b4b7215a6sh
86defense-evasionT1070.003Clear Command History9Disable Bash History Logging with SSH -T5f8abd62-f615-43c5-b6be-f780f25790a1sh
87defense-evasionT1070.002Clear Linux or Mac System Logs1rm -rf989cc1b1-3642-4260-a809-54f9dd559683sh
88defense-evasionT1070.002Clear Linux or Mac System Logs2Overwrite Linux Mail Spool1602ff76-ed7f-4c94-b550-2f727b4782d4bash
89defense-evasionT1070.002Clear Linux or Mac System Logs3Overwrite Linux Logd304b2dc-90b4-4465-a650-16ddd503f7b5bash
90defense-evasionT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
91defense-evasionT1027.004Compile After Delivery3C compiled0377aa6-850a-42b2-95f0-de558d80be57bash
92defense-evasionT1027.004Compile After Delivery4CC compileda97bb11-d6d0-4fc1-b445-e443d1346efebash
93defense-evasionT1027.004Compile After Delivery5Go compile78bd3fa7-773c-449e-a978-dc1f1500bc52bash
94defense-evasionT1140Deobfuscate/Decode Files or Information3Base64 decoding with Python356dc0e8-684f-4428-bb94-9313998ad608sh
95defense-evasionT1140Deobfuscate/Decode Files or Information4Base64 decoding with Perl6604d964-b9f6-4d4b-8ce8-499829a14d0ash
96defense-evasionT1140Deobfuscate/Decode Files or Information5Base64 decoding with shell utilitiesb4f6a567-a27a-41e5-b8ef-ac4b4008bb7esh
97defense-evasionT1140Deobfuscate/Decode Files or Information6Hex decoding with shell utilities005943f9-8dd5-4349-8b46-0313c0a9f973sh
98defense-evasionT1562.008Disable Cloud Logs1AWS CloudTrail Changes9c10dc6b-20bd-403a-8e67-50ef7d07ed4esh
99defense-evasionT1562.004Disable or Modify System Firewall7Stop/Start UFW firewallfe135572-edcd-49a2-afe6-1d39521c5a9ash
100defense-evasionT1562.004Disable or Modify System Firewall8Stop/Start UFW firewall systemctl9fd99609-1854-4f3c-b47b-97d9a5972bd1sh
101defense-evasionT1562.004Disable or Modify System Firewall9Turn off UFW logging8a95b832-2c2a-494d-9cb0-dc9dd97c8badsh
102defense-evasionT1562.004Disable or Modify System Firewall10Add and delete UFW firewall rulesb2563a4e-c4b8-429c-8d47-d5bcb227ba7ash
103defense-evasionT1562.004Disable or Modify System Firewall11Edit UFW firewall user.rules filebeaf815a-c883-4194-97e9-fdbbb2bbdd7csh
104defense-evasionT1562.004Disable or Modify System Firewall12Edit UFW firewall ufw.conf filec1d8c4eb-88da-4927-ae97-c7c25893803bsh
105defense-evasionT1562.004Disable or Modify System Firewall13Edit UFW firewall sysctl.conf filec4ae0701-88d3-4cd8-8bce-4801ed9f97e4sh
106defense-evasionT1562.004Disable or Modify System Firewall14Edit UFW firewall main configuration file7b697ece-8270-46b5-bbc7-6b9e27081831sh
107defense-evasionT1562.004Disable or Modify System Firewall15Tail the UFW firewall log file419cca0c-fa52-4572-b0d7-bc7c6f388a27sh
108defense-evasionT1562.001Disable or Modify Tools1Disable syslog4ce786f8-e601-44b5-bfae-9ebb15a7d1c8sh
109defense-evasionT1562.001Disable or Modify Tools2Disable Cb Responseae8943f7-0f8d-44de-962d-fbc2e2f03eb8sh
110defense-evasionT1562.001Disable or Modify Tools3Disable SELinuxfc225f36-9279-4c39-b3f9-5141ab74f8d8sh
111defense-evasionT1562.001Disable or Modify Tools4Stop Crowdstrike Falcon on Linux828a1278-81cc-4802-96ab-188bf29ca77dsh
112defense-evasionT1562.001Disable or Modify Tools25office-365-Disable-AntiPhishRuleb9bbae2c-2ba6-4cf3-b452-8e8f908696f3powershell
113defense-evasionT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
114defense-evasionT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
115defense-evasionT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
116defense-evasionT1070.004File Deletion1Delete a single file - Linux/macOS562d737f-2fc6-4b09-8c2a-7f8ff0828480sh
117defense-evasionT1070.004File Deletion2Delete an entire folder - Linux/macOSa415f17e-ce8d-4ce2-a8b4-83b674e7017esh
118defense-evasionT1070.004File Deletion3Overwrite and delete a file with shred039b4b10-2900-404b-b67f-4b6d49aa6499sh
119defense-evasionT1070.004File Deletion8Delete Filesystem - Linuxf3aa95fe-4f10-4485-ad26-abf22a764c52bash
120defense-evasionT1564.001Hidden Files and Directories1Create a hidden file in a hidden directory61a782e5-9a19-40b5-8ba4-69a4b9f3d7besh
121defense-evasionT1562.003Impair Command History Logging1Disable history collection4eafdb45-0f79-4d66-aa86-a3e2c08791f5sh
122defense-evasionT1562.003Impair Command History Logging2Mac HISTCONTROL468566d5-83e5-40c1-b338-511e1659628dmanual
123defense-evasionT1562.006Indicator Blocking1Auditing Configuration Changes on Linux Host212cfbcf-4770-4980-bc21-303e37abd0e3bash
124defense-evasionT1562.006Indicator Blocking2Logging Configuration Changes on Linux Host7d40bc58-94c7-4fbb-88d9-ebce9fcdb60cbash
125defense-evasionT1553.004Install Root Certificate1Install root CA on CentOS/RHEL9c096ec4-fd42-419d-a762-d64cc950627esh
126defense-evasionT1553.004Install Root Certificate2Install root CA on Debian/Ubuntu53bcf8a0-1549-4b85-b919-010c56d724ffsh
127defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification1chmod - Change file or folder mode (numeric mode)34ca1464-de9d-40c6-8c77-690adf36a135bash
128defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification2chmod - Change file or folder mode (symbolic mode)fc9d6695-d022-4a80-91b1-381f5c35aff3bash
129defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification3chmod - Change file or folder mode (numeric mode) recursivelyea79f937-4a4d-4348-ace6-9916aec453a4bash
130defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification4chmod - Change file or folder mode (symbolic mode) recursively0451125c-b5f6-488f-993b-5a32b09f7d8fbash
131defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification5chown - Change file or folder ownership and groupd169e71b-85f9-44ec-8343-27093ff3dfc0bash
132defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification6chown - Change file or folder ownership and group recursivelyb78598be-ff39-448f-a463-adbf2a5b7848bash
133defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification7chown - Change file or folder mode ownership only967ba79d-f184-4e0e-8d09-6362b3162e99bash
134defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification8chown - Change file or folder ownership recursively3b015515-b3d8-44e9-b8cd-6fa84faf30b2bash
135defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification9chattr - Remove immutable file attributee7469fe2-ad41-4382-8965-99b94dd3c13fsh
136defense-evasionT1036.005Match Legitimate Name or Location1Execute a process from a directory masquerading as the current parent directory.812c3ab8-94b0-4698-a9bf-9420af23ce24sh
137defense-evasionT1027Obfuscated Files or Information1Decode base64 Data into Scriptf45df6be-2e1e-4136-a384-8f18ab3826fbsh
138defense-evasionT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
139defense-evasionT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
140defense-evasionT1036.003Rename System Utilities2Masquerading as Linux crond process.a315bfff-7a98-403b-b442-2ea1b255e556sh
141defense-evasionT1014Rootkit1Loadable Kernel Module based Rootkitdfb50072-e45a-4c75-a17e-a484809c8553sh
142defense-evasionT1014Rootkit2Loadable Kernel Module based Rootkit75483ef8-f10f-444a-bf02-62eb0e48db6fsh
143defense-evasionT1548.001Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
144defense-evasionT1548.001Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
145defense-evasionT1548.001Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
146defense-evasionT1548.001Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
147defense-evasionT1548.001Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
148defense-evasionT1036.006Space after Filename2Space After Filenameb95ce2eb-a093-4cd8-938d-5258cef656eabash
149defense-evasionT1548.003Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
150defense-evasionT1548.003Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
151defense-evasionT1548.003Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
152defense-evasionT1497.001System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
153defense-evasionT1070.006Timestomp1Set a file's access timestamp5f9113d5-ed75-47ed-ba23-ea3573d05810sh
154defense-evasionT1070.006Timestomp2Set a file's modification timestamp20ef1523-8758-4898-b5a2-d026cc3d2c52sh
155defense-evasionT1070.006Timestomp3Set a file's creation timestamp8164a4a6-f99c-4661-ac4f-80f5e4e78d2bsh
156defense-evasionT1070.006Timestomp4Modify file timestamps using reference file631ea661-d661-44b0-abdb-7a7f3fc08e50sh
157impactT1485Data Destruction2macOS/Linux - Overwrite file with DD38deee99-fd65-4031-bec8-bfa4f9f26146bash
158impactT1486Data Encrypted for Impact1Encrypt files using gpg (Linux)7b8ce084-3922-4618-8d22-95f996173765bash
159impactT1486Data Encrypted for Impact2Encrypt files using 7z (Linux)53e6735a-4727-44cc-b35b-237682a151adbash
160impactT1486Data Encrypted for Impact3Encrypt files using ccrypt (Linux)08cbf59f-85da-4369-a5f4-049cffd7709fbash
161impactT1486Data Encrypted for Impact4Encrypt files using openssl (Linux)142752dc-ca71-443b-9359-cf6f497315f1bash
162impactT1496Resource Hijacking1macOS/Linux - Simulate CPU Load with Yes904a5a0e-fb02-490d-9f8d-0e256eb37549bash
163impactT1529System Shutdown/Reboot3Restart System via `shutdown` - macOS/Linux6326dbc4-444b-4c04-88f4-27e94d0327cbbash
164impactT1529System Shutdown/Reboot4Shutdown System via `shutdown` - macOS/Linux4963a81e-a3ad-4f02-adda-812343b351debash
165impactT1529System Shutdown/Reboot5Restart System via `reboot` - macOS/Linux47d0b042-a918-40ab-8cf9-150ffe919027bash
166impactT1529System Shutdown/Reboot6Shutdown System via `halt` - Linux918f70ab-e1ef-49ff-bc57-b27021df84ddbash
167impactT1529System Shutdown/Reboot7Reboot System via `halt` - Linux78f92e14-f1e9-4446-b3e9-f1b921f2459ebash
168impactT1529System Shutdown/Reboot8Shutdown System via `poweroff` - Linux73a90cd2-48a2-4ac5-8594-2af35fa909fabash
169impactT1529System Shutdown/Reboot9Reboot System via `poweroff` - Linux61303105-ff60-427b-999e-efb90b314e41bash
170discoveryT1217Browser Bookmark Discovery1List Mozilla Firefox Bookmark Database Files on Linux3a41f169-a5ab-407f-9269-abafdb5da6c2sh
171discoveryT1083File and Directory Discovery3Nix File and Directory Discoveryffc8b249-372a-4b74-adcd-e4c0430842desh
172discoveryT1083File and Directory Discovery4Nix File and Directory Discovery 213c5e1ae-605b-46c4-a79f-db28c77ff24esh
173discoveryT1087.001Local Account1Enumerate all accounts (Local)f8aab3dd-5990-4bf8-b8ab-2226c951696fsh
174discoveryT1087.001Local Account2View sudoers accessfed9be70-0186-4bde-9f8a-20945f9370c2sh
175discoveryT1087.001Local Account3View accounts with UID 0c955a599-3653-4fe5-b631-f11c00eb0397sh
176discoveryT1087.001Local Account4List opened files by user7e46c7a5-0142-45be-a858-1a3ecb4fd3cbsh
177discoveryT1087.001Local Account5Show if a user account has ever logged in remotely0f0b6a29-08c3-44ad-a30b-47fd996b2110sh
178discoveryT1087.001Local Account6Enumerate users and groupse6f36545-dc1e-47f0-9f48-7f730f54a02esh
179discoveryT1069.001Local Groups1Permission Groups Discovery (Local)952931a4-af0b-4335-bbbe-73c8c5b327aesh
180discoveryT1046Network Service Scanning1Port Scan68e907da-2539-48f6-9fc9-257a78c05540sh
181discoveryT1046Network Service Scanning2Port Scan Nmap515942b0-a09f-4163-a7bb-22fefb6f185fsh
182discoveryT1135Network Share Discovery2Network Share Discovery - linux875805bc-9e86-4e87-be86-3a5527315caebash
183discoveryT1040Network Sniffing1Packet Capture Linux7fe741f7-b265-4951-a7c7-320889083b3ebash
184discoveryT1201Password Policy Discovery1Examine password complexity policy - Ubuntu085fe567-ac84-47c7-ac4c-2688ce28265bbash
185discoveryT1201Password Policy Discovery2Examine password complexity policy - CentOS/RHEL 7.x78a12e65-efff-4617-bc01-88f17d71315dbash
186discoveryT1201Password Policy Discovery3Examine password complexity policy - CentOS/RHEL 6.x6ce12552-0adb-4f56-89ff-95ce268f6358bash
187discoveryT1201Password Policy Discovery4Examine password expiration policy - All Linux7c86c55c-70fa-4a05-83c9-3aa19b145d1abash
188discoveryT1057Process Discovery1Process Discovery - ps4ff64f0b-aaf2-4866-b39d-38d9791407ccsh
189discoveryT1018Remote System Discovery6Remote System Discovery - arp nixacb6b1ff-e2ad-4d64-806c-6c35fe73b951sh
190discoveryT1018Remote System Discovery7Remote System Discovery - sweep96db2632-8417-4dbb-b8bb-a8b92ba391desh
191discoveryT1018Remote System Discovery12Remote System Discovery - ip neighbour158bd4dd-6359-40ab-b13c-285b9ef6fa25sh
192discoveryT1018Remote System Discovery13Remote System Discovery - ip route1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1sh
193discoveryT1018Remote System Discovery14Remote System Discovery - ip tcp_metrics6c2da894-0b57-43cb-87af-46ea3b501388sh
194discoveryT1518.001Security Software Discovery4Security Software Discovery - ps (Linux)23b91cd2-c99c-4002-9e41-317c63e024a2sh
195discoveryT1497.001System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
196discoveryT1082System Information Discovery3List OS Informationcccb070c-df86-4216-a5bc-9fb60c74e27csh
197discoveryT1082System Information Discovery4Linux VM Check via Hardware31dad7ad-2286-4c02-ae92-274418c85fecbash
198discoveryT1082System Information Discovery5Linux VM Check via Kernel Modules8057d484-0fae-49a4-8302-4812c4f1e64ebash
199discoveryT1082System Information Discovery7Hostname Discovery486e88ea-4f56-470f-9b57-3f4d73f39133bash
200discoveryT1082System Information Discovery11Environment variables discovery on macos and linuxfcbdd43f-f4ad-42d5-98f3-0218097e2720sh
201discoveryT1016System Network Configuration Discovery3System Network Configuration Discoveryc141bbdb-7fca-4254-9fd6-f47e79447e17sh
202discoveryT1049System Network Connections Discovery3System Network Connections Discovery Linux & MacOS9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2sh
203discoveryT1033System Owner/User Discovery2System Owner/User Discovery2a9b677d-a230-44f4-ad86-782df1ef108csh
204persistenceT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
205persistenceT1098Account Manipulation4Azure - adding user to Azure AD role0e65ae27-5385-46b4-98ac-607a8ee82261powershell
206persistenceT1098Account Manipulation5Azure - adding service principal to Azure AD role92c40b3f-c406-4d1f-8d2b-c039bf5009e4powershell
207persistenceT1098Account Manipulation6Azure - adding user to Azure role in subscription1a94b3fc-b080-450a-b3d8-6d9b57b472eapowershell
208persistenceT1098Account Manipulation7Azure - adding service principal to Azure role in subscriptionc8f4bc29-a151-48da-b3be-4680af56f404powershell
209persistenceT1098.001Additional Cloud Credentials1Azure AD Application Hijacking - Service Principalb8e747c3-bdf7-4d71-bce2-f1df2a057406powershell
210persistenceT1098.001Additional Cloud Credentials2Azure AD Application Hijacking - App Registrationa12b5531-acab-4618-a470-0dafb294a87apowershell
211persistenceT1098.001Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
212persistenceT1053.001At (Linux)1At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
213persistenceT1176Browser Extensions1Chrome (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
214persistenceT1176Browser Extensions2Chrome (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
215persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
216persistenceT1136.003Cloud Account1AWS - Create a new IAM user8d1c2368-b503-40c9-9057-8e42f21c58adsh
217persistenceT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
218persistenceT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
219persistenceT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
220persistenceT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
221persistenceT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
222persistenceT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
223persistenceT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
224persistenceT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
225persistenceT1547.006Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
226persistenceT1136.001Local Account1Create a user account on a Linux system40d8eabd-e394-46f6-8785-b9bfa1d011d2bash
227persistenceT1136.001Local Account5Create a new user in Linux with `root` UID and GID.a1040a30-d28b-4eda-bd99-bb2861a4616cbash
228persistenceT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
229persistenceT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
230persistenceT1037.004RC Scripts2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
231persistenceT1037.004RC Scripts3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
232persistenceT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcbash
233persistenceT1543.002Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
234persistenceT1543.002Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
235persistenceT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
236persistenceT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
237persistenceT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
238persistenceT1546.005Trap1Trapa74b2e07-5952-4c03-8b56-56274b076b61sh
239persistenceT1546.004Unix Shell Configuration Modification1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
240persistenceT1546.004Unix Shell Configuration Modification2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
241command-and-controlT1105Ingress Tool Transfer1rsync remote file copy (push)0fc6e977-cb12-44f6-b263-2824ba917409bash
242command-and-controlT1105Ingress Tool Transfer2rsync remote file copy (pull)3180f7d5-52c0-4493-9ea0-e3431a84773fbash
243command-and-controlT1105Ingress Tool Transfer3scp remote file copy (push)83a49600-222b-4866-80a0-37736ad29344bash
244command-and-controlT1105Ingress Tool Transfer4scp remote file copy (pull)b9d22b9a-9778-4426-abf0-568ea64e9c33bash
245command-and-controlT1105Ingress Tool Transfer5sftp remote file copy (push)f564c297-7978-4aa9-b37a-d90477feea4ebash
246command-and-controlT1105Ingress Tool Transfer6sftp remote file copy (pull)0139dba1-f391-405e-a4f5-f3989f2c88efbash
247command-and-controlT1105Ingress Tool Transfer14whois file downloadc99a829f-0bb8-4187-b2c6-d47d1df74cabsh
248command-and-controlT1090.001Internal Proxy1Connection Proxy0ac21132-4485-4212-a681-349e8a6637cdsh
249command-and-controlT1571Non-Standard Port2Testing usage of uncommonly used port5db21e1d-dd9c-4a50-b885-b1e748912767sh
250command-and-controlT1132.001Standard Encoding1Base64 Encoded data.1164f70f-9a88-4dff-b9ff-dc70e7bf0c25sh
251command-and-controlT1071.001Web Protocols3Malicious User Agents - Nix2d7c471a-e887-4b78-b0dc-b0df1f2e0658sh
252executionT1053.001At (Linux)1At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
253executionT1609Container Administration Command1ExecIntoContainerd03bfcd3-ed87-49c8-8880-44bb772dea4bbash
254executionT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
255executionT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
256executionT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
257executionT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
258executionT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
259executionT1059.006Python1Execute shell script via python's command mode arguement3a95cdb2-c6ea-4761-b24e-02b71889b8bbsh
260executionT1059.006Python2Execute Python via scripts (Linux)6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8sh
261executionT1059.006Python3Execute Python via Python executables (Linux)0b44d79b-570a-4b27-a31f-3bf2156e5eaash
262executionT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
263executionT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
264executionT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
265executionT1059.004Unix Shell1Create and Execute Bash Shell Script7e7ac3ed-f795-4fa5-b711-09d6fbe9b873sh
266executionT1059.004Unix Shell2Command-Line Interfaced0c88567-803d-4dca-99b4-7ce65e7b257csh
267exfiltrationT1030Data Transfer Size Limits1Data Transfer Size Limitsab936c51-10f4-46ce-9144-e02137b2016ash
268exfiltrationT1048Exfiltration Over Alternative Protocol1Exfiltration Over Alternative Protocol - SSHf6786cc8-beda-4915-a4d6-ac2f193bb988sh
269exfiltrationT1048Exfiltration Over Alternative Protocol2Exfiltration Over Alternative Protocol - SSH7c3cb337-35ae-4d06-bf03-3032ed2ec268sh
270exfiltrationT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 Protocol2Exfiltrate data HTTPS using curl linux4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01bash
271exfiltrationT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol1Exfiltration Over Alternative Protocol - HTTP1d1abbd6-a3d3-4b2e-bef5-c59293f46effmanual
272exfiltrationT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol3Exfiltration Over Alternative Protocol - DNSc403b5a4-b5fc-49f2-b181-d1c80d27db45manual
273initial-accessT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud