Files
atomic-red-team/atomics/Indexes/Indexes-CSV/linux-index.csv
T
2023-06-26 20:31:24 +00:00

47 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
3defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
4defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification1chmod - Change file or folder mode (numeric mode)34ca1464-de9d-40c6-8c77-690adf36a135bash
5defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification2chmod - Change file or folder mode (symbolic mode)fc9d6695-d022-4a80-91b1-381f5c35aff3bash
6defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification3chmod - Change file or folder mode (numeric mode) recursivelyea79f937-4a4d-4348-ace6-9916aec453a4bash
7defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification4chmod - Change file or folder mode (symbolic mode) recursively0451125c-b5f6-488f-993b-5a32b09f7d8fbash
8defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification5chown - Change file or folder ownership and groupd169e71b-85f9-44ec-8343-27093ff3dfc0bash
9defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification6chown - Change file or folder ownership and group recursivelyb78598be-ff39-448f-a463-adbf2a5b7848bash
10defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification7chown - Change file or folder mode ownership only967ba79d-f184-4e0e-8d09-6362b3162e99bash
11defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification8chown - Change file or folder ownership recursively3b015515-b3d8-44e9-b8cd-6fa84faf30b2bash
12defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification9chattr - Remove immutable file attributee7469fe2-ad41-4382-8965-99b94dd3c13fsh
13defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification10Chmod through c script973631cf-6680-4ffa-a053-045e1b6b67absh
14defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification11Chown through c script18592ba1-5f88-4e3c-abc8-ab1c6042e389sh
15defense-evasionT1014Rootkit1Loadable Kernel Module based Rootkitdfb50072-e45a-4c75-a17e-a484809c8553sh
16defense-evasionT1014Rootkit2Loadable Kernel Module based Rootkit75483ef8-f10f-444a-bf02-62eb0e48db6fsh
17defense-evasionT1014Rootkit3dynamic-linker based rootkit (libprocesshider)1338bf0c-fd0c-48c0-9e65-329f18e2c0d3sh
18defense-evasionT1014Rootkit4Loadable Kernel Module based Rootkit (Diamorphine)0b996469-48c6-46e2-8155-a17f8b6c2247sh
19defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
20defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
21defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
22defense-evasionT1036.005Masquerading: Match Legitimate Name or Location1Execute a process from a directory masquerading as the current parent directory.812c3ab8-94b0-4698-a9bf-9420af23ce24sh
23defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
24defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs1rm -rf989cc1b1-3642-4260-a809-54f9dd559683sh
25defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs13Delete system journal logs via rm and journalctl utilitiesca50dd85-81ff-48ca-92e1-61f119cb1dcfsh
26defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs14Overwrite Linux Mail Spool1602ff76-ed7f-4c94-b550-2f727b4782d4bash
27defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs15Overwrite Linux Logd304b2dc-90b4-4465-a650-16ddd503f7b5bash
28defense-evasionT1070.003Indicator Removal on Host: Clear Command History1Clear Bash history (rm)a934276e-2be5-4a36-93fd-98adbb5bd4fcsh
29defense-evasionT1070.003Indicator Removal on Host: Clear Command History2Clear Bash history (echo)cbf506a5-dd78-43e5-be7e-a46b7c7a0a11sh
30defense-evasionT1070.003Indicator Removal on Host: Clear Command History3Clear Bash history (cat dev/null)b1251c35-dcd3-4ea1-86da-36d27b54f31fsh
31defense-evasionT1070.003Indicator Removal on Host: Clear Command History4Clear Bash history (ln dev/null)23d348f3-cc5c-4ba9-bd0a-ae09069f0914sh
32defense-evasionT1070.003Indicator Removal on Host: Clear Command History5Clear Bash history (truncate)47966a1d-df4f-4078-af65-db6d9aa20739sh
33defense-evasionT1070.003Indicator Removal on Host: Clear Command History6Clear history of a bunch of shells7e6721df-5f08-4370-9255-f06d8a77af4csh
34defense-evasionT1070.003Indicator Removal on Host: Clear Command History7Clear and Disable Bash History Logging784e4011-bd1a-4ecd-a63a-8feb278512e6sh
35defense-evasionT1070.003Indicator Removal on Host: Clear Command History8Use Space Before Command to Avoid Logging to History53b03a54-4529-4992-852d-a00b4b7215a6sh
36defense-evasionT1070.003Indicator Removal on Host: Clear Command History9Disable Bash History Logging with SSH -T5f8abd62-f615-43c5-b6be-f780f25790a1sh
37defense-evasionT1140Deobfuscate/Decode Files or Information3Base64 decoding with Python356dc0e8-684f-4428-bb94-9313998ad608sh
38defense-evasionT1140Deobfuscate/Decode Files or Information4Base64 decoding with Perl6604d964-b9f6-4d4b-8ce8-499829a14d0ash
39defense-evasionT1140Deobfuscate/Decode Files or Information5Base64 decoding with shell utilitiesb4f6a567-a27a-41e5-b8ef-ac4b4008bb7esh
40defense-evasionT1140Deobfuscate/Decode Files or Information6Hex decoding with shell utilities005943f9-8dd5-4349-8b46-0313c0a9f973sh
41defense-evasionT1140Deobfuscate/Decode Files or Information7Linux Base64 Encoded Shebang in CLI3a15c372-67c1-4430-ac8e-ec06d641ce4dsh
42defense-evasionT1140Deobfuscate/Decode Files or Information8XOR decoding and command execution using Pythonc3b65cd5-ee51-4e98-b6a3-6cbdec138efcbash
43defense-evasionT1562Impair Defenses2Disable journal logging via systemctl utilityc3a377f9-1203-4454-aa35-9d391d34768fsh
44defense-evasionT1562Impair Defenses3Disable journal logging via sed utility12e5551c-8d5c-408e-b3e4-63f53b03379fsh
45defense-evasionT1070.008Email Collection: Mailbox Manipulation2Copy and Delete Mailbox Data on Linux25e2be0e-96f7-4417-bd16-a4a2500e3802bash
46defense-evasionT1070.008Email Collection: Mailbox Manipulation5Copy and Modify Mailbox Data on Linux6d99f93c-da56-49e3-b195-163090ace4f6bash
47defense-evasionT1070.006Indicator Removal on Host: Timestomp1Set a file's access timestamp5f9113d5-ed75-47ed-ba23-ea3573d05810sh
48defense-evasionT1070.006Indicator Removal on Host: Timestomp2Set a file's modification timestamp20ef1523-8758-4898-b5a2-d026cc3d2c52sh
49defense-evasionT1070.006Indicator Removal on Host: Timestomp3Set a file's creation timestamp8164a4a6-f99c-4661-ac4f-80f5e4e78d2bsh
50defense-evasionT1070.006Indicator Removal on Host: Timestomp4Modify file timestamps using reference file631ea661-d661-44b0-abdb-7a7f3fc08e50sh
51defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall7Stop/Start UFW firewallfe135572-edcd-49a2-afe6-1d39521c5a9ash
52defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall8Stop/Start UFW firewall systemctl9fd99609-1854-4f3c-b47b-97d9a5972bd1sh
53defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall9Turn off UFW logging8a95b832-2c2a-494d-9cb0-dc9dd97c8badsh
54defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall10Add and delete UFW firewall rulesb2563a4e-c4b8-429c-8d47-d5bcb227ba7ash
55defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall11Edit UFW firewall user.rules filebeaf815a-c883-4194-97e9-fdbbb2bbdd7csh
56defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall12Edit UFW firewall ufw.conf filec1d8c4eb-88da-4927-ae97-c7c25893803bsh
57defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall13Edit UFW firewall sysctl.conf filec4ae0701-88d3-4cd8-8bce-4801ed9f97e4sh
58defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall14Edit UFW firewall main configuration file7b697ece-8270-46b5-bbc7-6b9e27081831sh
59defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall15Tail the UFW firewall log file419cca0c-fa52-4572-b0d7-bc7c6f388a27sh
60defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall16Disable iptables7784c64e-ed0b-4b65-bf63-c86db229fd56sh
61defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall17Modify/delete iptables firewall rules899a7fb5-d197-4951-8614-f19ac4a73ad4sh
62defense-evasionT1027.001Obfuscated Files or Information: Binary Padding1Pad Binary to Change Hash - Linux/macOS ddffe2346c-abd5-4b45-a713-bf5f1ebd573ash
63defense-evasionT1027.001Obfuscated Files or Information: Binary Padding2Pad Binary to Change Hash using truncate command - Linux/macOSe22a9e89-69c7-410f-a473-e6c212cd2292sh
64defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
65defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
66defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
67defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
68defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
69defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
70defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
71defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid6Do reconnaissance for files that have the setuid bit set8e36da01-cd29-45fd-be72-8a0fcaad4481sh
72defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid7Do reconnaissance for files that have the setgid bit set3fb46e17-f337-4c14-9f9a-a471946533e2sh
73defense-evasionT1562.006Impair Defenses: Indicator Blocking1Auditing Configuration Changes on Linux Host212cfbcf-4770-4980-bc21-303e37abd0e3bash
74defense-evasionT1562.006Impair Defenses: Indicator Blocking2Logging Configuration Changes on Linux Host7d40bc58-94c7-4fbb-88d9-ebce9fcdb60cbash
75defense-evasionT1036.004Masquerading: Masquerade Task or Service3linux rename /proc/pid/comm using prctlf0e3aaea-5cd9-4db6-a077-631dd19b27a8sh
76defense-evasionT1562.003Impair Defenses: HISTCONTROL1Disable history collection4eafdb45-0f79-4d66-aa86-a3e2c08791f5sh
77defense-evasionT1562.003Impair Defenses: HISTCONTROL2Mac HISTCONTROL468566d5-83e5-40c1-b338-511e1659628dmanual
78defense-evasionT1562.003Impair Defenses: HISTCONTROL3Clear bash history878794f7-c511-4199-a950-8c28b3ed8e5bbash
79defense-evasionT1562.003Impair Defenses: HISTCONTROL4Setting the HISTCONTROL environment variable10ab786a-028e-4465-96f6-9e83ca6c5f24bash
80defense-evasionT1562.003Impair Defenses: HISTCONTROL5Setting the HISTFILESIZE environment variable5cafd6c1-2f43-46eb-ac47-a5301ba0a618bash
81defense-evasionT1562.003Impair Defenses: HISTCONTROL6Setting the HISTFILE environment variableb3dacb6c-a9e3-44ec-bf87-38db60c5cad1bash
82defense-evasionT1562.003Impair Defenses: HISTCONTROL7Setting the HISTIGNORE environment variablef12acddb-7502-4ce6-a146-5b62c59592f1bash
83defense-evasionT1562.001Impair Defenses: Disable or Modify Tools1Disable syslog4ce786f8-e601-44b5-bfae-9ebb15a7d1c8sh
84defense-evasionT1562.001Impair Defenses: Disable or Modify Tools2Disable Cb Responseae8943f7-0f8d-44de-962d-fbc2e2f03eb8sh
85defense-evasionT1562.001Impair Defenses: Disable or Modify Tools3Disable SELinuxfc225f36-9279-4c39-b3f9-5141ab74f8d8sh
86defense-evasionT1562.001Impair Defenses: Disable or Modify Tools4Stop Crowdstrike Falcon on Linux828a1278-81cc-4802-96ab-188bf29ca77dsh
87defense-evasionT1562.001Impair Defenses: Disable or Modify Tools38Clear History23b88394-091b-4968-a42d-fb8076992443sh
88defense-evasionT1562.001Impair Defenses: Disable or Modify Tools39Suspend History94f6a1c9-aae7-46a4-9083-2bb1f5768ec4sh
89defense-evasionT1562.001Impair Defenses: Disable or Modify Tools40Reboot Linux Host via Kernel System Request6d6d3154-1a52-4d1a-9d51-92ab8148b32esh
90defense-evasionT1562.001Impair Defenses: Disable or Modify Tools41Clear Pagging Cachef790927b-ea85-4a16-b7b2-7eb44176a510sh
91defense-evasionT1562.001Impair Defenses: Disable or Modify Tools42Disable Memory Swape74e4c63-6fde-4ad2-9ee8-21c3a1733114sh
92defense-evasionT1027Obfuscated Files or Information1Decode base64 Data into Scriptf45df6be-2e1e-4136-a384-8f18ab3826fbsh
93defense-evasionT1036.003Masquerading: Rename System Utilities2Masquerading as Linux crond process.a315bfff-7a98-403b-b442-2ea1b255e556sh
94defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate1Install root CA on CentOS/RHEL9c096ec4-fd42-419d-a762-d64cc950627esh
95defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate2Install root CA on Debian/Ubuntu53bcf8a0-1549-4b85-b919-010c56d724ffsh
96defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery3C compiled0377aa6-850a-42b2-95f0-de558d80be57bash
97defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery4CC compileda97bb11-d6d0-4fc1-b445-e443d1346efebash
98defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery5Go compile78bd3fa7-773c-449e-a978-dc1f1500bc52bash
99defense-evasionT1070.004Indicator Removal on Host: File Deletion1Delete a single file - Linux/macOS562d737f-2fc6-4b09-8c2a-7f8ff0828480sh
100defense-evasionT1070.004Indicator Removal on Host: File Deletion2Delete an entire folder - Linux/macOSa415f17e-ce8d-4ce2-a8b4-83b674e7017esh
101defense-evasionT1070.004Indicator Removal on Host: File Deletion3Overwrite and delete a file with shred039b4b10-2900-404b-b67f-4b6d49aa6499sh
102defense-evasionT1070.004Indicator Removal on Host: File Deletion8Delete Filesystem - Linuxf3aa95fe-4f10-4485-ad26-abf22a764c52bash
103defense-evasionT1027.002Obfuscated Files or Information: Software Packing1Binary simply packed by UPX (linux)11c46cd8-e471-450e-acb8-52a1216ae6a4sh
104defense-evasionT1027.002Obfuscated Files or Information: Software Packing2Binary packed by UPX, with modified headers (linux)f06197f8-ff46-48c2-a0c6-afc1b50665e1sh
105defense-evasionT1036.006Masquerading: Space after Filename2Space After Filenameb95ce2eb-a093-4cd8-938d-5258cef656eabash
106defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories1Create a hidden file in a hidden directory61a782e5-9a19-40b5-8ba4-69a4b9f3d7besh
107defense-evasionT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
108defense-evasionT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
109defense-evasionT1078.003Valid Accounts: Local Accounts10Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
110persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
111persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
112persistenceT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
113persistenceT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
114persistenceT1053.003Scheduled Task/Job: Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
115persistenceT1176Browser Extensions1Chrome (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
116persistenceT1176Browser Extensions2Chrome (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
117persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
118persistenceT1546.005Event Triggered Execution: Trap1Trap EXITa74b2e07-5952-4c03-8b56-56274b076b61sh
119persistenceT1546.005Event Triggered Execution: Trap2Trap SIGINTa547d1ba-1d7a-4cc5-a9cb-8d65e8809636sh
120persistenceT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
121persistenceT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
122persistenceT1136.001Create Account: Local Account1Create a user account on a Linux system40d8eabd-e394-46f6-8785-b9bfa1d011d2bash
123persistenceT1136.001Create Account: Local Account5Create a new user in Linux with `root` UID and GID.a1040a30-d28b-4eda-bd99-bb2861a4616cbash
124persistenceT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcbash
125persistenceT1136.002Create Account: Domain Account4Active Directory Create Admin Account562aa072-524e-459a-ba2b-91f1afccf5absh
126persistenceT1136.002Create Account: Domain Account5Active Directory Create User Account (Non-elevated)8c992cb3-a46e-4fd5-b005-b1bab185af31sh
127persistenceT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
128persistenceT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
129persistenceT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
130persistenceT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
131persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
132persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
133persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc3Append to the system shell profile694b3cc8-6a78-4d35-9e74-0123d009e94bsh
134persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc4Append commands user shell profilebbdb06bc-bab6-4f5b-8232-ba3fbed51d77sh
135persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc5System shell profile scripts8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4sh
136persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc6Create/Append to .bash_logout37ad2f24-7c53-4a50-92da-427a4ad13f58bash
137persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
138persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
139persistenceT1543.002Create or Modify System Process: Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
140persistenceT1543.002Create or Modify System Process: Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
141persistenceT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
142persistenceT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
143persistenceT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
144persistenceT1078.003Valid Accounts: Local Accounts10Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
145command-and-controlT1132.001Data Encoding: Standard Encoding1Base64 Encoded data.1164f70f-9a88-4dff-b9ff-dc70e7bf0c25sh
146command-and-controlT1090.003Proxy: Multi-hop Proxy3Tor Proxy Usage - Debian/Ubuntu5ff9d047-6e9c-4357-b39b-5cf89d9b59c7sh
147command-and-controlT1571Non-Standard Port2Testing usage of uncommonly used port5db21e1d-dd9c-4a50-b885-b1e748912767sh
148command-and-controlT1071.001Application Layer Protocol: Web Protocols3Malicious User Agents - Nix2d7c471a-e887-4b78-b0dc-b0df1f2e0658sh
149command-and-controlT1105Ingress Tool Transfer1rsync remote file copy (push)0fc6e977-cb12-44f6-b263-2824ba917409bash
150command-and-controlT1105Ingress Tool Transfer2rsync remote file copy (pull)3180f7d5-52c0-4493-9ea0-e3431a84773fbash
151command-and-controlT1105Ingress Tool Transfer3scp remote file copy (push)83a49600-222b-4866-80a0-37736ad29344bash
152command-and-controlT1105Ingress Tool Transfer4scp remote file copy (pull)b9d22b9a-9778-4426-abf0-568ea64e9c33bash
153command-and-controlT1105Ingress Tool Transfer5sftp remote file copy (push)f564c297-7978-4aa9-b37a-d90477feea4ebash
154command-and-controlT1105Ingress Tool Transfer6sftp remote file copy (pull)0139dba1-f391-405e-a4f5-f3989f2c88efbash
155command-and-controlT1105Ingress Tool Transfer14whois file downloadc99a829f-0bb8-4187-b2c6-d47d1df74cabsh
156command-and-controlT1105Ingress Tool Transfer27Linux Download File and Runbdc373c5-e9cf-4563-8a7b-a9ba720a90f3sh
157command-and-controlT1090.001Proxy: Internal Proxy1Connection Proxy0ac21132-4485-4212-a681-349e8a6637cdsh
158collectionT1560.001Archive Collected Data: Archive via Utility5Data Compressed - nix - zipc51cec55-28dd-4ad2-9461-1eacbc82c3a0sh
159collectionT1560.001Archive Collected Data: Archive via Utility6Data Compressed - nix - gzip Single Filecde3c2af-3485-49eb-9c1f-0ed60e9cc0afsh
160collectionT1560.001Archive Collected Data: Archive via Utility7Data Compressed - nix - tar Folder or File7af2b51e-ad1c-498c-aca8-d3290c19535ash
161collectionT1560.001Archive Collected Data: Archive via Utility8Data Encrypted with zip and gpg symmetric0286eb44-e7ce-41a0-b109-3da516e05a5fsh
162collectionT1560.001Archive Collected Data: Archive via Utility9Encrypts collected data with AES-256 and Base64a743e3a6-e8b2-4a30-abe7-ca85d201b5d3bash
163collectionT1113Screen Capture3X Windows Capture8206dd0c-faf6-4d74-ba13-7fbe13dce6acbash
164collectionT1113Screen Capture4Capture Linux Desktop using Import Tool9cd1cccb-91e4-4550-9139-e20a586fcea1bash
165collectionT1056.001Input Capture: Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
166collectionT1056.001Input Capture: Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
167collectionT1056.001Input Capture: Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
168collectionT1056.001Input Capture: Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
169collectionT1056.001Input Capture: Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
170collectionT1074.001Data Staged: Local Data Staging2Stage data from Discovery.sh39ce0303-ae16-4b9e-bb5b-4f53e8262066bash
171collectionT1115Clipboard Data5Add or copy content to clipboard with xClipee363e53-b083-4230-aff3-f8d955f2d5bbsh
172collectionT1560.002Archive Collected Data: Archive via Library1Compressing data using GZip in Python (Linux)391f5298-b12d-4636-8482-35d9c17d53a8bash
173collectionT1560.002Archive Collected Data: Archive via Library2Compressing data using bz2 in Python (Linux)c75612b2-9de0-4d7c-879c-10d7b077072dbash
174collectionT1560.002Archive Collected Data: Archive via Library3Compressing data using zipfile in Python (Linux)001a042b-859f-44d9-bf81-fd1c4e2200b0bash
175collectionT1560.002Archive Collected Data: Archive via Library4Compressing data using tarfile in Python (Linux)e86f1b4b-fcc1-4a2a-ae10-b49da01458dbbash
176privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
177privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
178privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
179privilege-escalationT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
180privilege-escalationT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
181privilege-escalationT1053.003Scheduled Task/Job: Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
182privilege-escalationT1546.005Event Triggered Execution: Trap1Trap EXITa74b2e07-5952-4c03-8b56-56274b076b61sh
183privilege-escalationT1546.005Event Triggered Execution: Trap2Trap SIGINTa547d1ba-1d7a-4cc5-a9cb-8d65e8809636sh
184privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
185privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
186privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
187privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
188privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
189privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
190privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
191privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid6Do reconnaissance for files that have the setuid bit set8e36da01-cd29-45fd-be72-8a0fcaad4481sh
192privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid7Do reconnaissance for files that have the setgid bit set3fb46e17-f337-4c14-9f9a-a471946533e2sh
193privilege-escalationT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
194privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
195privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
196privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
197privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
198privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
199privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc3Append to the system shell profile694b3cc8-6a78-4d35-9e74-0123d009e94bsh
200privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc4Append commands user shell profilebbdb06bc-bab6-4f5b-8232-ba3fbed51d77sh
201privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc5System shell profile scripts8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4sh
202privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc6Create/Append to .bash_logout37ad2f24-7c53-4a50-92da-427a4ad13f58bash
203privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
204privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
205privilege-escalationT1543.002Create or Modify System Process: Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
206privilege-escalationT1543.002Create or Modify System Process: Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
207privilege-escalationT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
208privilege-escalationT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
209privilege-escalationT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
210privilege-escalationT1078.003Valid Accounts: Local Accounts10Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
211credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
212credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
213credential-accessT1056.001Input Capture: Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
214credential-accessT1056.001Input Capture: Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
215credential-accessT1056.001Input Capture: Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
216credential-accessT1056.001Input Capture: Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
217credential-accessT1056.001Input Capture: Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
218credential-accessT1110.001Brute Force: Password Guessing5SUDO Brute Force - Debianba1bf0b6-f32b-4db0-b7cc-d78cacc76700bash
219credential-accessT1110.001Brute Force: Password Guessing6SUDO Brute Force - Redhat4097bc00-5eeb-4d56-aaf9-287d60351d95bash
220credential-accessT1003.007OS Credential Dumping: Proc Filesystem1Dump individual process memory with sh (Local)7e91138a-8e74-456d-a007-973d67a0bb80sh
221credential-accessT1003.007OS Credential Dumping: Proc Filesystem2Dump individual process memory with Python (Local)437b2003-a20d-4ed8-834c-4964f24eec63sh
222credential-accessT1003.007OS Credential Dumping: Proc Filesystem3Capture Passwords with MimiPenguina27418de-bdce-4ebd-b655-38f04842bf0cbash
223credential-accessT1040Network Sniffing1Packet Capture Linux using tshark or tcpdump7fe741f7-b265-4951-a7c7-320889083b3ebash
224credential-accessT1040Network Sniffing9Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo10c710c9-9104-4d5f-8829-5b65391e2a29bash
225credential-accessT1040Network Sniffing10Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo7a0895f0-84c1-4adf-8491-a21510b1d4c1bash
226credential-accessT1040Network Sniffing11Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo515575ab-d213-42b1-aa64-ef6a2dd4641bbash
227credential-accessT1040Network Sniffing12Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudob1cbdf8b-6078-48f5-a890-11ea19d7f8e9bash
228credential-accessT1552Unsecured Credentials1AWS - Retrieve EC2 Password Data using stratusa21118de-b11e-4ebd-b655-42f11142df0csh
229credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers9LaZagne.py - Dump Credentials from Firefox Browser87e88698-621b-4c45-8a89-4eaebdeaabb1sh
230credential-accessT1552.004Unsecured Credentials: Private Keys2Discover Private SSH Keys46959285-906d-40fa-9437-5a439accd878sh
231credential-accessT1552.004Unsecured Credentials: Private Keys3Copy Private SSH Keys with CP7c247dc7-5128-4643-907b-73a76d9135c3sh
232credential-accessT1552.004Unsecured Credentials: Private Keys4Copy Private SSH Keys with rsync864bb0b2-6bb5-489a-b43b-a77b3a16d68ash
233credential-accessT1552.004Unsecured Credentials: Private Keys5Copy the users GnuPG directory with rsync2a5a0601-f5fb-4e2e-aa09-73282ae6afcash
234credential-accessT1552.003Unsecured Credentials: Bash History1Search Through Bash History3cfde62b-7c33-4b26-a61e-755d6131c8cesh
235credential-accessT1552.001Unsecured Credentials: Credentials In Files1Find AWS credentials2b93758e-a8d7-4e3b-bc7b-d3aa8d7ecb17sh
236credential-accessT1552.001Unsecured Credentials: Credentials In Files3Extract passwords with grepbd4cf0d1-7646-474e-8610-78ccf5a097c4sh
237credential-accessT1552.001Unsecured Credentials: Credentials In Files6Find and Access Github Credentialsda4f751a-020b-40d7-b9ff-d433b7799803bash
238credential-accessT1110.004Brute Force: Credential Stuffing1SSH Credential Stuffing From Linux4f08197a-2a8a-472d-9589-cd2895ef22adbash
239credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow1Access /etc/shadow (Local)3723ab77-c546-403c-8fb4-bb577033b235bash
240credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow2Access /etc/passwd (Local)60e860b6-8ae6-49db-ad07-5e73edd88f5dsh
241credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow3Access /etc/{shadow,passwd} with a standard bin that's not catdf1a55ae-019d-4120-bc35-94f4bc5c4b0abash
242credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow4Access /etc/{shadow,passwd} with shell builtinsf5aa6543-6cb2-4fae-b9c2-b96e14721713bash
243discoveryT1033System Owner/User Discovery2System Owner/User Discovery2a9b677d-a230-44f4-ad86-782df1ef108csh
244discoveryT1087.002Account Discovery: Domain Account23Active Directory Domain Search096b6d2a-b63f-4100-8fa0-525da4cd25cash
245discoveryT1087.001Account Discovery: Local Account1Enumerate all accounts (Local)f8aab3dd-5990-4bf8-b8ab-2226c951696fsh
246discoveryT1087.001Account Discovery: Local Account2View sudoers accessfed9be70-0186-4bde-9f8a-20945f9370c2sh
247discoveryT1087.001Account Discovery: Local Account3View accounts with UID 0c955a599-3653-4fe5-b631-f11c00eb0397sh
248discoveryT1087.001Account Discovery: Local Account4List opened files by user7e46c7a5-0142-45be-a858-1a3ecb4fd3cbsh
249discoveryT1087.001Account Discovery: Local Account5Show if a user account has ever logged in remotely0f0b6a29-08c3-44ad-a30b-47fd996b2110sh
250discoveryT1087.001Account Discovery: Local Account6Enumerate users and groupse6f36545-dc1e-47f0-9f48-7f730f54a02esh
251discoveryT1497.001Virtualization/Sandbox Evasion: System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
252discoveryT1069.002Permission Groups Discovery: Domain Groups15Active Directory Domain Search Using LDAP - Linux (Ubuntu)/macOSd58d749c-4450-4975-a9e9-8b1d562755c2sh
253discoveryT1007System Service Discovery3System Service Discovery - systemctlf4b26bce-4c2c-46c0-bcc5-fce062d38befbash
254discoveryT1040Network Sniffing1Packet Capture Linux using tshark or tcpdump7fe741f7-b265-4951-a7c7-320889083b3ebash
255discoveryT1040Network Sniffing9Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo10c710c9-9104-4d5f-8829-5b65391e2a29bash
256discoveryT1040Network Sniffing10Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo7a0895f0-84c1-4adf-8491-a21510b1d4c1bash
257discoveryT1040Network Sniffing11Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo515575ab-d213-42b1-aa64-ef6a2dd4641bbash
258discoveryT1040Network Sniffing12Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudob1cbdf8b-6078-48f5-a890-11ea19d7f8e9bash
259discoveryT1135Network Share Discovery2Network Share Discovery - linux875805bc-9e86-4e87-be86-3a5527315caebash
260discoveryT1082System Information Discovery3List OS Informationcccb070c-df86-4216-a5bc-9fb60c74e27csh
261discoveryT1082System Information Discovery4Linux VM Check via Hardware31dad7ad-2286-4c02-ae92-274418c85fecbash
262discoveryT1082System Information Discovery5Linux VM Check via Kernel Modules8057d484-0fae-49a4-8302-4812c4f1e64ebash
263discoveryT1082System Information Discovery7Hostname Discovery486e88ea-4f56-470f-9b57-3f4d73f39133bash
264discoveryT1082System Information Discovery11Environment variables discovery on macos and linuxfcbdd43f-f4ad-42d5-98f3-0218097e2720sh
265discoveryT1082System Information Discovery24Linux List Kernel Modules034fe21c-3186-49dd-8d5d-128b35f181c7sh
266discoveryT1217Browser Bookmark Discovery1List Mozilla Firefox Bookmark Database Files on Linux3a41f169-a5ab-407f-9269-abafdb5da6c2sh
267discoveryT1016System Network Configuration Discovery3System Network Configuration Discoveryc141bbdb-7fca-4254-9fd6-f47e79447e17sh
268discoveryT1083File and Directory Discovery3Nix File and Directory Discoveryffc8b249-372a-4b74-adcd-e4c0430842desh
269discoveryT1083File and Directory Discovery4Nix File and Directory Discovery 213c5e1ae-605b-46c4-a79f-db28c77ff24esh
270discoveryT1049System Network Connections Discovery3System Network Connections Discovery Linux & MacOS9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2sh
271discoveryT1057Process Discovery1Process Discovery - ps4ff64f0b-aaf2-4866-b39d-38d9791407ccsh
272discoveryT1069.001Permission Groups Discovery: Local Groups1Permission Groups Discovery (Local)952931a4-af0b-4335-bbbe-73c8c5b327aesh
273discoveryT1201Password Policy Discovery1Examine password complexity policy - Ubuntu085fe567-ac84-47c7-ac4c-2688ce28265bbash
274discoveryT1201Password Policy Discovery2Examine password complexity policy - CentOS/RHEL 7.x78a12e65-efff-4617-bc01-88f17d71315dbash
275discoveryT1201Password Policy Discovery3Examine password complexity policy - CentOS/RHEL 6.x6ce12552-0adb-4f56-89ff-95ce268f6358bash
276discoveryT1201Password Policy Discovery4Examine password expiration policy - All Linux7c86c55c-70fa-4a05-83c9-3aa19b145d1abash
277discoveryT1614.001System Location Discovery: System Language Discovery3Discover System Language with locale837d609b-845e-4519-90ce-edc3b4b0e138sh
278discoveryT1614.001System Location Discovery: System Language Discovery4Discover System Language with localectl07ce871a-b3c3-44a3-97fa-a20118fdc7c9sh
279discoveryT1614.001System Location Discovery: System Language Discovery5Discover System Language by locale file5d7057c9-2c8a-4026-91dd-13b5584daa69sh
280discoveryT1614.001System Location Discovery: System Language Discovery6Discover System Language by Environment Variable Querycb8f7cdc-36c4-4ed0-befc-7ad7d24dfd7ash
281discoveryT1518.001Software Discovery: Security Software Discovery4Security Software Discovery - ps (Linux)23b91cd2-c99c-4002-9e41-317c63e024a2sh
282discoveryT1018Remote System Discovery6Remote System Discovery - arp nixacb6b1ff-e2ad-4d64-806c-6c35fe73b951sh
283discoveryT1018Remote System Discovery7Remote System Discovery - sweep96db2632-8417-4dbb-b8bb-a8b92ba391desh
284discoveryT1018Remote System Discovery12Remote System Discovery - ip neighbour158bd4dd-6359-40ab-b13c-285b9ef6fa25sh
285discoveryT1018Remote System Discovery13Remote System Discovery - ip route1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1sh
286discoveryT1018Remote System Discovery14Remote System Discovery - ip tcp_metrics6c2da894-0b57-43cb-87af-46ea3b501388sh
287discoveryT1046Network Service Discovery1Port Scan68e907da-2539-48f6-9fc9-257a78c05540bash
288discoveryT1046Network Service Discovery2Port Scan Nmap515942b0-a09f-4163-a7bb-22fefb6f185fsh
289impactT1531Account Access Removal4Change User Password via passwd3c717bf3-2ecc-4d79-8ac8-0bfbf08fbce6sh
290impactT1486Data Encrypted for Impact1Encrypt files using gpg (Linux)7b8ce084-3922-4618-8d22-95f996173765bash
291impactT1486Data Encrypted for Impact2Encrypt files using 7z (Linux)53e6735a-4727-44cc-b35b-237682a151adbash
292impactT1486Data Encrypted for Impact3Encrypt files using ccrypt (Linux)08cbf59f-85da-4369-a5f4-049cffd7709fbash
293impactT1486Data Encrypted for Impact4Encrypt files using openssl (Linux)142752dc-ca71-443b-9359-cf6f497315f1bash
294impactT1496Resource Hijacking1macOS/Linux - Simulate CPU Load with Yes904a5a0e-fb02-490d-9f8d-0e256eb37549bash
295impactT1485Data Destruction2macOS/Linux - Overwrite file with DD38deee99-fd65-4031-bec8-bfa4f9f26146bash
296impactT1529System Shutdown/Reboot3Restart System via `shutdown` - macOS/Linux6326dbc4-444b-4c04-88f4-27e94d0327cbbash
297impactT1529System Shutdown/Reboot4Shutdown System via `shutdown` - macOS/Linux4963a81e-a3ad-4f02-adda-812343b351debash
298impactT1529System Shutdown/Reboot5Restart System via `reboot` - macOS/Linux47d0b042-a918-40ab-8cf9-150ffe919027bash
299impactT1529System Shutdown/Reboot6Shutdown System via `halt` - Linux918f70ab-e1ef-49ff-bc57-b27021df84ddbash
300impactT1529System Shutdown/Reboot7Reboot System via `halt` - Linux78f92e14-f1e9-4446-b3e9-f1b921f2459ebash
301impactT1529System Shutdown/Reboot8Shutdown System via `poweroff` - Linux73a90cd2-48a2-4ac5-8594-2af35fa909fabash
302impactT1529System Shutdown/Reboot9Reboot System via `poweroff` - Linux61303105-ff60-427b-999e-efb90b314e41bash
303executionT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
304executionT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
305executionT1053.003Scheduled Task/Job: Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
306executionT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
307executionT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
308executionT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
309executionT1059.004Command and Scripting Interpreter: Bash1Create and Execute Bash Shell Script7e7ac3ed-f795-4fa5-b711-09d6fbe9b873sh
310executionT1059.004Command and Scripting Interpreter: Bash2Command-Line Interfaced0c88567-803d-4dca-99b4-7ce65e7b257csh
311executionT1059.004Command and Scripting Interpreter: Bash3Harvest SUID executable files46274fc6-08a7-4956-861b-24cbbaa0503csh
312executionT1059.004Command and Scripting Interpreter: Bash4LinEnum tool executiona2b35a63-9df1-4806-9a4d-5fe0500845f2sh
313executionT1059.004Command and Scripting Interpreter: Bash5New script file in the tmp directory8cd1947b-4a54-41fb-b5ea-07d0ace04f81sh
314executionT1059.004Command and Scripting Interpreter: Bash6What shell is running7b38e5cc-47be-44f0-a425-390305c76c17sh
315executionT1059.004Command and Scripting Interpreter: Bash7What shells are availablebf23c7dc-1004-4949-8262-4c1d1ef87702sh
316executionT1059.004Command and Scripting Interpreter: Bash8Command line scriptsb04ed73c-7d43-4dc8-b563-a2fc595cba1ash
317executionT1059.004Command and Scripting Interpreter: Bash9Obfuscated command line scripts5bec4cc8-f41e-437b-b417-33ff60acf9afsh
318executionT1059.004Command and Scripting Interpreter: Bash10Change login shellc7ac59cb-13cc-4622-81dc-6d2fee9bfac7bash
319executionT1059.004Command and Scripting Interpreter: Bash11Environment variable scriptsbdaebd56-368b-4970-a523-f905ff4a8a51bash
320executionT1059.004Command and Scripting Interpreter: Bash12Detecting pipe-to-shellfca246a8-a585-4f28-a2df-6495973976a1bash
321executionT1059.006Command and Scripting Interpreter: Python1Execute shell script via python's command mode arguement3a95cdb2-c6ea-4761-b24e-02b71889b8bbsh
322executionT1059.006Command and Scripting Interpreter: Python2Execute Python via scripts (Linux)6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8sh
323executionT1059.006Command and Scripting Interpreter: Python3Execute Python via Python executables (Linux)0b44d79b-570a-4b27-a31f-3bf2156e5eaash
324executionT1059.006Command and Scripting Interpreter: Python4Python pty module and spawn function used to spawn sh or bash161d694c-b543-4434-85c3-c3a433e33792bash
325executionT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
326initial-accessT1078.003Valid Accounts: Local Accounts8Create local account (Linux)02a91c34-8a5b-4bed-87af-501103eb5357bash
327initial-accessT1078.003Valid Accounts: Local Accounts9Reactivate a locked/expired account (Linux)d2b95631-62d7-45a3-aaef-0972cea97931bash
328initial-accessT1078.003Valid Accounts: Local Accounts10Login as nobody (Linux)3d2cd093-ee05-41bd-a802-59ee5c301b85bash
329exfiltrationT1048.002Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol2Exfiltrate data HTTPS using curl linux4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01bash
330exfiltrationT1048Exfiltration Over Alternative Protocol1Exfiltration Over Alternative Protocol - SSHf6786cc8-beda-4915-a4d6-ac2f193bb988sh
331exfiltrationT1048Exfiltration Over Alternative Protocol2Exfiltration Over Alternative Protocol - SSH7c3cb337-35ae-4d06-bf03-3032ed2ec268sh
332exfiltrationT1030Data Transfer Size Limits1Data Transfer Size Limitsab936c51-10f4-46ce-9144-e02137b2016ash
333exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol1Exfiltration Over Alternative Protocol - HTTP1d1abbd6-a3d3-4b2e-bef5-c59293f46effmanual
334exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol3Exfiltration Over Alternative Protocol - DNSc403b5a4-b5fc-49f2-b181-d1c80d27db45manual
335exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol8Python3 http.server3ea1f938-f80a-4305-9aa8-431bc4867313sh