Files
atomic-red-team/atomics/Indexes/Indexes-CSV/linux-index.csv
T
2021-12-07 16:27:21 +00:00

31 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2credential-accessT1003.008/etc/passwd and /etc/shadow1Access /etc/shadow (Local)3723ab77-c546-403c-8fb4-bb577033b235bash
3credential-accessT1003.008/etc/passwd and /etc/shadow2Access /etc/passwd (Local)60e860b6-8ae6-49db-ad07-5e73edd88f5dsh
4credential-accessT1003.008/etc/passwd and /etc/shadow3Access /etc/{shadow,passwd} with a standard bin that's not catdf1a55ae-019d-4120-bc35-94f4bc5c4b0abash
5credential-accessT1003.008/etc/passwd and /etc/shadow4Access /etc/{shadow,passwd} with shell builtinsf5aa6543-6cb2-4fae-b9c2-b96e14721713bash
6credential-accessT1552.003Bash History1Search Through Bash History3cfde62b-7c33-4b26-a61e-755d6131c8cesh
7credential-accessT1552.007Container API1ListSecrets43c3a49d-d15c-45e6-b303-f6e177e44a9abash
8credential-accessT1552.007Container API2Cat the contents of a Kubernetes service account token file788e0019-a483-45da-bcfe-96353d46820fsh
9credential-accessT1110.004Credential Stuffing1SSH Credential Stuffing From Linux4f08197a-2a8a-472d-9589-cd2895ef22adbash
10credential-accessT1552.001Credentials In Files2Extract passwords with grepbd4cf0d1-7646-474e-8610-78ccf5a097c4sh
11credential-accessT1552.001Credentials In Files5Find and Access Github Credentialsda4f751a-020b-40d7-b9ff-d433b7799803bash
12credential-accessT1056.001Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
13credential-accessT1056.001Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
14credential-accessT1056.001Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
15credential-accessT1056.001Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
16credential-accessT1056.001Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
17credential-accessT1040Network Sniffing1Packet Capture Linux7fe741f7-b265-4951-a7c7-320889083b3ebash
18credential-accessT1110.001Password Guessing3Brute Force Credentials of single Azure AD user5a51ef57-299e-4d62-8e11-2d440df55e69powershell
19credential-accessT1110.003Password Spraying4Password spray all Azure AD users with a single passworda8aa2d3e-1c52-4016-bc73-0f8854cfa80apowershell
20credential-accessT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
21credential-accessT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
22credential-accessT1552.004Private Keys2Discover Private SSH Keys46959285-906d-40fa-9437-5a439accd878sh
23credential-accessT1552.004Private Keys3Copy Private SSH Keys with CP7c247dc7-5128-4643-907b-73a76d9135c3sh
24credential-accessT1552.004Private Keys4Copy Private SSH Keys with rsync864bb0b2-6bb5-489a-b43b-a77b3a16d68ash
25credential-accessT1552.004Private Keys5Copy the users GnuPG directory with rsync2a5a0601-f5fb-4e2e-aa09-73282ae6afcash
26credential-accessT1003.007Proc Filesystem1Dump individual process memory with sh (Local)7e91138a-8e74-456d-a007-973d67a0bb80sh
27credential-accessT1003.007Proc Filesystem2Dump individual process memory with Python (Local)437b2003-a20d-4ed8-834c-4964f24eec63sh
28credential-accessT1606.002SAML Tokens1Golden SAMLb16a03bc-1089-4dcc-ad98-30fe8f3a2b31powershell
29collectionT1560.002Archive via Library1Compressing data using GZip in Python (Linux)391f5298-b12d-4636-8482-35d9c17d53a8bash
30collectionT1560.002Archive via Library2Compressing data using bz2 in Python (Linux)c75612b2-9de0-4d7c-879c-10d7b077072dbash
31collectionT1560.002Archive via Library3Compressing data using zipfile in Python (Linux)001a042b-859f-44d9-bf81-fd1c4e2200b0bash
32collectionT1560.002Archive via Library4Compressing data using tarfile in Python (Linux)e86f1b4b-fcc1-4a2a-ae10-b49da01458dbbash
33collectionT1560.001Archive via Utility5Data Compressed - nix - zipc51cec55-28dd-4ad2-9461-1eacbc82c3a0sh
34collectionT1560.001Archive via Utility6Data Compressed - nix - gzip Single Filecde3c2af-3485-49eb-9c1f-0ed60e9cc0afsh
35collectionT1560.001Archive via Utility7Data Compressed - nix - tar Folder or File7af2b51e-ad1c-498c-aca8-d3290c19535ash
36collectionT1560.001Archive via Utility8Data Encrypted with zip and gpg symmetric0286eb44-e7ce-41a0-b109-3da516e05a5fsh
37collectionT1056.001Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
38collectionT1056.001Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
39collectionT1056.001Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
40collectionT1056.001Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
41collectionT1056.001Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
42collectionT1074.001Local Data Staging2Stage data from Discovery.sh39ce0303-ae16-4b9e-bb5b-4f53e8262066bash
43collectionT1113Screen Capture3X Windows Capture8206dd0c-faf6-4d74-ba13-7fbe13dce6acbash
44collectionT1113Screen Capture4Capture Linux Desktop using Import Tool9cd1cccb-91e4-4550-9139-e20a586fcea1bash
45privilege-escalationT1053.001At (Linux)1At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
46privilege-escalationT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
47privilege-escalationT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
48privilege-escalationT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
49privilege-escalationT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
50privilege-escalationT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
51privilege-escalationT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
52privilege-escalationT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
53privilege-escalationT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
54privilege-escalationT1611Escape to Host1Deploy container using nsenter container escape0b2f9520-a17a-4671-9dba-3bd034099fffsh
55privilege-escalationT1547.006Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
56privilege-escalationT1037.004RC Scripts2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
57privilege-escalationT1037.004RC Scripts3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
58privilege-escalationT1548.001Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
59privilege-escalationT1548.001Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
60privilege-escalationT1548.001Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
61privilege-escalationT1548.001Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
62privilege-escalationT1548.001Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
63privilege-escalationT1548.003Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
64privilege-escalationT1548.003Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
65privilege-escalationT1548.003Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
66privilege-escalationT1543.002Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
67privilege-escalationT1543.002Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
68privilege-escalationT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
69privilege-escalationT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
70privilege-escalationT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
71privilege-escalationT1546.005Trap1Trapa74b2e07-5952-4c03-8b56-56274b076b61sh
72privilege-escalationT1546.004Unix Shell Configuration Modification1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
73privilege-escalationT1546.004Unix Shell Configuration Modification2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
74defense-evasionT1027.001Binary Padding1Pad Binary to Change Hash - Linux/macOS ddffe2346c-abd5-4b45-a713-bf5f1ebd573ash
75defense-evasionT1070.003Clear Command History1Clear Bash history (rm)a934276e-2be5-4a36-93fd-98adbb5bd4fcsh
76defense-evasionT1070.003Clear Command History2Clear Bash history (echo)cbf506a5-dd78-43e5-be7e-a46b7c7a0a11sh
77defense-evasionT1070.003Clear Command History3Clear Bash history (cat dev/null)b1251c35-dcd3-4ea1-86da-36d27b54f31fsh
78defense-evasionT1070.003Clear Command History4Clear Bash history (ln dev/null)23d348f3-cc5c-4ba9-bd0a-ae09069f0914sh
79defense-evasionT1070.003Clear Command History5Clear Bash history (truncate)47966a1d-df4f-4078-af65-db6d9aa20739sh
80defense-evasionT1070.003Clear Command History6Clear history of a bunch of shells7e6721df-5f08-4370-9255-f06d8a77af4csh
81defense-evasionT1070.003Clear Command History7Clear and Disable Bash History Logging784e4011-bd1a-4ecd-a63a-8feb278512e6sh
82defense-evasionT1070.003Clear Command History8Use Space Before Command to Avoid Logging to History53b03a54-4529-4992-852d-a00b4b7215a6sh
83defense-evasionT1070.003Clear Command History9Disable Bash History Logging with SSH -T5f8abd62-f615-43c5-b6be-f780f25790a1sh
84defense-evasionT1070.002Clear Linux or Mac System Logs1rm -rf989cc1b1-3642-4260-a809-54f9dd559683sh
85defense-evasionT1070.002Clear Linux or Mac System Logs2Overwrite Linux Mail Spool1602ff76-ed7f-4c94-b550-2f727b4782d4bash
86defense-evasionT1070.002Clear Linux or Mac System Logs3Overwrite Linux Logd304b2dc-90b4-4465-a650-16ddd503f7b5bash
87defense-evasionT1140Deobfuscate/Decode Files or Information3Base64 decoding with Python356dc0e8-684f-4428-bb94-9313998ad608sh
88defense-evasionT1140Deobfuscate/Decode Files or Information4Base64 decoding with Perl6604d964-b9f6-4d4b-8ce8-499829a14d0ash
89defense-evasionT1140Deobfuscate/Decode Files or Information5Base64 decoding with shell utilitiesb4f6a567-a27a-41e5-b8ef-ac4b4008bb7esh
90defense-evasionT1140Deobfuscate/Decode Files or Information6Hex decoding with shell utilities005943f9-8dd5-4349-8b46-0313c0a9f973sh
91defense-evasionT1610Deploy Container1Deploy container using nsenter container escape58004e22-022c-4c51-b4a8-2b85ac5c596bsh
92defense-evasionT1562.008Disable Cloud Logs1AWS CloudTrail Changes9c10dc6b-20bd-403a-8e67-50ef7d07ed4esh
93defense-evasionT1562.004Disable or Modify System Firewall7Stop/Start UFW firewallfe135572-edcd-49a2-afe6-1d39521c5a9ash
94defense-evasionT1562.004Disable or Modify System Firewall8Stop/Start UFW firewall systemctl9fd99609-1854-4f3c-b47b-97d9a5972bd1sh
95defense-evasionT1562.004Disable or Modify System Firewall9Turn off UFW logging8a95b832-2c2a-494d-9cb0-dc9dd97c8badsh
96defense-evasionT1562.004Disable or Modify System Firewall10Add and delete UFW firewall rulesb2563a4e-c4b8-429c-8d47-d5bcb227ba7ash
97defense-evasionT1562.004Disable or Modify System Firewall11Edit UFW firewall user.rules filebeaf815a-c883-4194-97e9-fdbbb2bbdd7csh
98defense-evasionT1562.004Disable or Modify System Firewall12Edit UFW firewall ufw.conf filec1d8c4eb-88da-4927-ae97-c7c25893803bsh
99defense-evasionT1562.004Disable or Modify System Firewall13Edit UFW firewall sysctl.conf filec4ae0701-88d3-4cd8-8bce-4801ed9f97e4sh
100defense-evasionT1562.004Disable or Modify System Firewall14Edit UFW firewall main configuration file7b697ece-8270-46b5-bbc7-6b9e27081831sh
101defense-evasionT1562.004Disable or Modify System Firewall15Tail the UFW firewall log file419cca0c-fa52-4572-b0d7-bc7c6f388a27sh
102defense-evasionT1562.001Disable or Modify Tools1Disable syslog4ce786f8-e601-44b5-bfae-9ebb15a7d1c8sh
103defense-evasionT1562.001Disable or Modify Tools2Disable Cb Responseae8943f7-0f8d-44de-962d-fbc2e2f03eb8sh
104defense-evasionT1562.001Disable or Modify Tools3Disable SELinuxfc225f36-9279-4c39-b3f9-5141ab74f8d8sh
105defense-evasionT1562.001Disable or Modify Tools4Stop Crowdstrike Falcon on Linux828a1278-81cc-4802-96ab-188bf29ca77dsh
106defense-evasionT1562.001Disable or Modify Tools25office-365-Disable-AntiPhishRuleb9bbae2c-2ba6-4cf3-b452-8e8f908696f3powershell
107defense-evasionT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
108defense-evasionT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
109defense-evasionT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
110defense-evasionT1070.004File Deletion1Delete a single file - Linux/macOS562d737f-2fc6-4b09-8c2a-7f8ff0828480sh
111defense-evasionT1070.004File Deletion2Delete an entire folder - Linux/macOSa415f17e-ce8d-4ce2-a8b4-83b674e7017esh
112defense-evasionT1070.004File Deletion3Overwrite and delete a file with shred039b4b10-2900-404b-b67f-4b6d49aa6499sh
113defense-evasionT1070.004File Deletion8Delete Filesystem - Linuxf3aa95fe-4f10-4485-ad26-abf22a764c52bash
114defense-evasionT1564.001Hidden Files and Directories1Create a hidden file in a hidden directory61a782e5-9a19-40b5-8ba4-69a4b9f3d7besh
115defense-evasionT1562.003Impair Command History Logging1Disable history collection4eafdb45-0f79-4d66-aa86-a3e2c08791f5sh
116defense-evasionT1562.003Impair Command History Logging2Mac HISTCONTROL468566d5-83e5-40c1-b338-511e1659628dmanual
117defense-evasionT1562.006Indicator Blocking1Auditing Configuration Changes on Linux Host212cfbcf-4770-4980-bc21-303e37abd0e3bash
118defense-evasionT1562.006Indicator Blocking2Logging Configuration Changes on Linux Host7d40bc58-94c7-4fbb-88d9-ebce9fcdb60cbash
119defense-evasionT1553.004Install Root Certificate1Install root CA on CentOS/RHEL9c096ec4-fd42-419d-a762-d64cc950627esh
120defense-evasionT1553.004Install Root Certificate2Install root CA on Debian/Ubuntu53bcf8a0-1549-4b85-b919-010c56d724ffsh
121defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification1chmod - Change file or folder mode (numeric mode)34ca1464-de9d-40c6-8c77-690adf36a135bash
122defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification2chmod - Change file or folder mode (symbolic mode)fc9d6695-d022-4a80-91b1-381f5c35aff3bash
123defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification3chmod - Change file or folder mode (numeric mode) recursivelyea79f937-4a4d-4348-ace6-9916aec453a4bash
124defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification4chmod - Change file or folder mode (symbolic mode) recursively0451125c-b5f6-488f-993b-5a32b09f7d8fbash
125defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification5chown - Change file or folder ownership and groupd169e71b-85f9-44ec-8343-27093ff3dfc0bash
126defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification6chown - Change file or folder ownership and group recursivelyb78598be-ff39-448f-a463-adbf2a5b7848bash
127defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification7chown - Change file or folder mode ownership only967ba79d-f184-4e0e-8d09-6362b3162e99bash
128defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification8chown - Change file or folder ownership recursively3b015515-b3d8-44e9-b8cd-6fa84faf30b2bash
129defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification9chattr - Remove immutable file attributee7469fe2-ad41-4382-8965-99b94dd3c13fsh
130defense-evasionT1036.005Match Legitimate Name or Location1Execute a process from a directory masquerading as the current parent directory.812c3ab8-94b0-4698-a9bf-9420af23ce24sh
131defense-evasionT1027Obfuscated Files or Information1Decode base64 Data into Scriptf45df6be-2e1e-4136-a384-8f18ab3826fbsh
132defense-evasionT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
133defense-evasionT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
134defense-evasionT1036.003Rename System Utilities2Masquerading as Linux crond process.a315bfff-7a98-403b-b442-2ea1b255e556sh
135defense-evasionT1014Rootkit1Loadable Kernel Module based Rootkitdfb50072-e45a-4c75-a17e-a484809c8553sh
136defense-evasionT1014Rootkit2Loadable Kernel Module based Rootkit75483ef8-f10f-444a-bf02-62eb0e48db6fsh
137defense-evasionT1548.001Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
138defense-evasionT1548.001Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
139defense-evasionT1548.001Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
140defense-evasionT1548.001Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
141defense-evasionT1548.001Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
142defense-evasionT1036.006Space after Filename2Space After Filenameb95ce2eb-a093-4cd8-938d-5258cef656eabash
143defense-evasionT1548.003Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
144defense-evasionT1548.003Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
145defense-evasionT1548.003Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
146defense-evasionT1497.001System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
147defense-evasionT1070.006Timestomp1Set a file's access timestamp5f9113d5-ed75-47ed-ba23-ea3573d05810sh
148defense-evasionT1070.006Timestomp2Set a file's modification timestamp20ef1523-8758-4898-b5a2-d026cc3d2c52sh
149defense-evasionT1070.006Timestomp3Set a file's creation timestamp8164a4a6-f99c-4661-ac4f-80f5e4e78d2bsh
150defense-evasionT1070.006Timestomp4Modify file timestamps using reference file631ea661-d661-44b0-abdb-7a7f3fc08e50sh
151impactT1485Data Destruction2macOS/Linux - Overwrite file with DD38deee99-fd65-4031-bec8-bfa4f9f26146bash
152impactT1486Data Encrypted for Impact1Encrypt files using gpg (Linux)7b8ce084-3922-4618-8d22-95f996173765bash
153impactT1486Data Encrypted for Impact2Encrypt files using 7z (Linux)53e6735a-4727-44cc-b35b-237682a151adbash
154impactT1486Data Encrypted for Impact3Encrypt files using ccrypt (Linux)08cbf59f-85da-4369-a5f4-049cffd7709fbash
155impactT1486Data Encrypted for Impact4Encrypt files using openssl (Linux)142752dc-ca71-443b-9359-cf6f497315f1bash
156impactT1496Resource Hijacking1macOS/Linux - Simulate CPU Load with Yes904a5a0e-fb02-490d-9f8d-0e256eb37549bash
157impactT1529System Shutdown/Reboot3Restart System via `shutdown` - macOS/Linux6326dbc4-444b-4c04-88f4-27e94d0327cbbash
158impactT1529System Shutdown/Reboot4Shutdown System via `shutdown` - macOS/Linux4963a81e-a3ad-4f02-adda-812343b351debash
159impactT1529System Shutdown/Reboot5Restart System via `reboot` - macOS/Linux47d0b042-a918-40ab-8cf9-150ffe919027bash
160impactT1529System Shutdown/Reboot6Shutdown System via `halt` - Linux918f70ab-e1ef-49ff-bc57-b27021df84ddbash
161impactT1529System Shutdown/Reboot7Reboot System via `halt` - Linux78f92e14-f1e9-4446-b3e9-f1b921f2459ebash
162impactT1529System Shutdown/Reboot8Shutdown System via `poweroff` - Linux73a90cd2-48a2-4ac5-8594-2af35fa909fabash
163impactT1529System Shutdown/Reboot9Reboot System via `poweroff` - Linux61303105-ff60-427b-999e-efb90b314e41bash
164discoveryT1217Browser Bookmark Discovery1List Mozilla Firefox Bookmark Database Files on Linux3a41f169-a5ab-407f-9269-abafdb5da6c2sh
165discoveryT1083File and Directory Discovery3Nix File and Diectory Discoveryffc8b249-372a-4b74-adcd-e4c0430842desh
166discoveryT1083File and Directory Discovery4Nix File and Directory Discovery 213c5e1ae-605b-46c4-a79f-db28c77ff24esh
167discoveryT1087.001Local Account1Enumerate all accounts (Local)f8aab3dd-5990-4bf8-b8ab-2226c951696fsh
168discoveryT1087.001Local Account2View sudoers accessfed9be70-0186-4bde-9f8a-20945f9370c2sh
169discoveryT1087.001Local Account3View accounts with UID 0c955a599-3653-4fe5-b631-f11c00eb0397sh
170discoveryT1087.001Local Account4List opened files by user7e46c7a5-0142-45be-a858-1a3ecb4fd3cbsh
171discoveryT1087.001Local Account5Show if a user account has ever logged in remotely0f0b6a29-08c3-44ad-a30b-47fd996b2110sh
172discoveryT1087.001Local Account6Enumerate users and groupse6f36545-dc1e-47f0-9f48-7f730f54a02esh
173discoveryT1069.001Local Groups1Permission Groups Discovery (Local)952931a4-af0b-4335-bbbe-73c8c5b327aesh
174discoveryT1046Network Service Scanning1Port Scan68e907da-2539-48f6-9fc9-257a78c05540sh
175discoveryT1046Network Service Scanning2Port Scan Nmap515942b0-a09f-4163-a7bb-22fefb6f185fsh
176discoveryT1135Network Share Discovery2Network Share Discovery - linux875805bc-9e86-4e87-be86-3a5527315caebash
177discoveryT1040Network Sniffing1Packet Capture Linux7fe741f7-b265-4951-a7c7-320889083b3ebash
178discoveryT1201Password Policy Discovery1Examine password complexity policy - Ubuntu085fe567-ac84-47c7-ac4c-2688ce28265bbash
179discoveryT1201Password Policy Discovery2Examine password complexity policy - CentOS/RHEL 7.x78a12e65-efff-4617-bc01-88f17d71315dbash
180discoveryT1201Password Policy Discovery3Examine password complexity policy - CentOS/RHEL 6.x6ce12552-0adb-4f56-89ff-95ce268f6358bash
181discoveryT1201Password Policy Discovery4Examine password expiration policy - All Linux7c86c55c-70fa-4a05-83c9-3aa19b145d1abash
182discoveryT1057Process Discovery1Process Discovery - ps4ff64f0b-aaf2-4866-b39d-38d9791407ccsh
183discoveryT1018Remote System Discovery6Remote System Discovery - arp nixacb6b1ff-e2ad-4d64-806c-6c35fe73b951sh
184discoveryT1018Remote System Discovery7Remote System Discovery - sweep96db2632-8417-4dbb-b8bb-a8b92ba391desh
185discoveryT1518.001Security Software Discovery4Security Software Discovery - ps (Linux)23b91cd2-c99c-4002-9e41-317c63e024a2sh
186discoveryT1497.001System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
187discoveryT1082System Information Discovery3List OS Informationcccb070c-df86-4216-a5bc-9fb60c74e27csh
188discoveryT1082System Information Discovery4Linux VM Check via Hardware31dad7ad-2286-4c02-ae92-274418c85fecbash
189discoveryT1082System Information Discovery5Linux VM Check via Kernel Modules8057d484-0fae-49a4-8302-4812c4f1e64ebash
190discoveryT1082System Information Discovery7Hostname Discovery486e88ea-4f56-470f-9b57-3f4d73f39133bash
191discoveryT1082System Information Discovery11Environment variables discovery on macos and linuxfcbdd43f-f4ad-42d5-98f3-0218097e2720sh
192discoveryT1016System Network Configuration Discovery3System Network Configuration Discoveryc141bbdb-7fca-4254-9fd6-f47e79447e17sh
193discoveryT1049System Network Connections Discovery3System Network Connections Discovery Linux & MacOS9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2sh
194discoveryT1033System Owner/User Discovery2System Owner/User Discovery2a9b677d-a230-44f4-ad86-782df1ef108csh
195persistenceT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
196persistenceT1098.001Additional Cloud Credentials1Azure AD Application Hijacking - Service Principalb8e747c3-bdf7-4d71-bce2-f1df2a057406powershell
197persistenceT1098.001Additional Cloud Credentials2Azure AD Application Hijacking - App Registrationa12b5531-acab-4618-a470-0dafb294a87apowershell
198persistenceT1098.001Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
199persistenceT1053.001At (Linux)1At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
200persistenceT1176Browser Extensions1Chrome (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
201persistenceT1176Browser Extensions2Chrome (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
202persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
203persistenceT1136.003Cloud Account1AWS - Create a new IAM user8d1c2368-b503-40c9-9057-8e42f21c58adsh
204persistenceT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
205persistenceT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
206persistenceT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
207persistenceT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
208persistenceT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
209persistenceT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
210persistenceT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
211persistenceT1547.006Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
212persistenceT1136.001Local Account1Create a user account on a Linux system40d8eabd-e394-46f6-8785-b9bfa1d011d2bash
213persistenceT1136.001Local Account5Create a new user in Linux with `root` UID and GID.a1040a30-d28b-4eda-bd99-bb2861a4616cbash
214persistenceT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
215persistenceT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
216persistenceT1037.004RC Scripts2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
217persistenceT1037.004RC Scripts3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
218persistenceT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcbash
219persistenceT1543.002Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
220persistenceT1543.002Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
221persistenceT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
222persistenceT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
223persistenceT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
224persistenceT1546.005Trap1Trapa74b2e07-5952-4c03-8b56-56274b076b61sh
225persistenceT1546.004Unix Shell Configuration Modification1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
226persistenceT1546.004Unix Shell Configuration Modification2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
227command-and-controlT1105Ingress Tool Transfer1rsync remote file copy (push)0fc6e977-cb12-44f6-b263-2824ba917409bash
228command-and-controlT1105Ingress Tool Transfer2rsync remote file copy (pull)3180f7d5-52c0-4493-9ea0-e3431a84773fbash
229command-and-controlT1105Ingress Tool Transfer3scp remote file copy (push)83a49600-222b-4866-80a0-37736ad29344bash
230command-and-controlT1105Ingress Tool Transfer4scp remote file copy (pull)b9d22b9a-9778-4426-abf0-568ea64e9c33bash
231command-and-controlT1105Ingress Tool Transfer5sftp remote file copy (push)f564c297-7978-4aa9-b37a-d90477feea4ebash
232command-and-controlT1105Ingress Tool Transfer6sftp remote file copy (pull)0139dba1-f391-405e-a4f5-f3989f2c88efbash
233command-and-controlT1105Ingress Tool Transfer14whois file downloadc99a829f-0bb8-4187-b2c6-d47d1df74cabsh
234command-and-controlT1090.001Internal Proxy1Connection Proxy0ac21132-4485-4212-a681-349e8a6637cdsh
235command-and-controlT1571Non-Standard Port2Testing usage of uncommonly used port5db21e1d-dd9c-4a50-b885-b1e748912767sh
236command-and-controlT1132.001Standard Encoding1Base64 Encoded data.1164f70f-9a88-4dff-b9ff-dc70e7bf0c25sh
237command-and-controlT1071.001Web Protocols3Malicious User Agents - Nix2d7c471a-e887-4b78-b0dc-b0df1f2e0658sh
238executionT1053.001At (Linux)1At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
239executionT1609Container Administration Command1ExecIntoContainerd03bfcd3-ed87-49c8-8880-44bb772dea4bbash
240executionT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
241executionT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
242executionT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
243executionT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
244executionT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
245executionT1610Deploy Container1Deploy container using nsenter container escape58004e22-022c-4c51-b4a8-2b85ac5c596bsh
246executionT1059.006Python1Execute shell script via python's command mode arguement3a95cdb2-c6ea-4761-b24e-02b71889b8bbsh
247executionT1059.006Python2Execute Python via scripts (Linux)6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8sh
248executionT1059.006Python3Execute Python via Python executables (Linux)0b44d79b-570a-4b27-a31f-3bf2156e5eaash
249executionT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
250executionT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
251executionT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
252executionT1059.004Unix Shell1Create and Execute Bash Shell Script7e7ac3ed-f795-4fa5-b711-09d6fbe9b873sh
253executionT1059.004Unix Shell2Command-Line Interfaced0c88567-803d-4dca-99b4-7ce65e7b257csh
254exfiltrationT1030Data Transfer Size Limits1Data Transfer Size Limitsab936c51-10f4-46ce-9144-e02137b2016ash
255exfiltrationT1048Exfiltration Over Alternative Protocol1Exfiltration Over Alternative Protocol - SSHf6786cc8-beda-4915-a4d6-ac2f193bb988sh
256exfiltrationT1048Exfiltration Over Alternative Protocol2Exfiltration Over Alternative Protocol - SSH7c3cb337-35ae-4d06-bf03-3032ed2ec268sh
257exfiltrationT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol1Exfiltration Over Alternative Protocol - HTTP1d1abbd6-a3d3-4b2e-bef5-c59293f46effmanual
258exfiltrationT1048.003Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol3Exfiltration Over Alternative Protocol - DNSc403b5a4-b5fc-49f2-b181-d1c80d27db45manual