Files
atomic-red-team/atomics/Indexes/Indexes-CSV/linux-index.csv
T
2022-08-01 21:38:41 +00:00

36 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2defense-evasionT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
3defense-evasionT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
4defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification1chmod - Change file or folder mode (numeric mode)34ca1464-de9d-40c6-8c77-690adf36a135bash
5defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification2chmod - Change file or folder mode (symbolic mode)fc9d6695-d022-4a80-91b1-381f5c35aff3bash
6defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification3chmod - Change file or folder mode (numeric mode) recursivelyea79f937-4a4d-4348-ace6-9916aec453a4bash
7defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification4chmod - Change file or folder mode (symbolic mode) recursively0451125c-b5f6-488f-993b-5a32b09f7d8fbash
8defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification5chown - Change file or folder ownership and groupd169e71b-85f9-44ec-8343-27093ff3dfc0bash
9defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification6chown - Change file or folder ownership and group recursivelyb78598be-ff39-448f-a463-adbf2a5b7848bash
10defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification7chown - Change file or folder mode ownership only967ba79d-f184-4e0e-8d09-6362b3162e99bash
11defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification8chown - Change file or folder ownership recursively3b015515-b3d8-44e9-b8cd-6fa84faf30b2bash
12defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification9chattr - Remove immutable file attributee7469fe2-ad41-4382-8965-99b94dd3c13fsh
13defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification10Chmod through c script973631cf-6680-4ffa-a053-045e1b6b67absh
14defense-evasionT1222.002Linux and Mac File and Directory Permissions Modification11Chown through c script18592ba1-5f88-4e3c-abc8-ab1c6042e389sh
15defense-evasionT1014Rootkit1Loadable Kernel Module based Rootkitdfb50072-e45a-4c75-a17e-a484809c8553sh
16defense-evasionT1014Rootkit2Loadable Kernel Module based Rootkit75483ef8-f10f-444a-bf02-62eb0e48db6fsh
17defense-evasionT1548.003Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
18defense-evasionT1548.003Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
19defense-evasionT1548.003Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
20defense-evasionT1036.005Match Legitimate Name or Location1Execute a process from a directory masquerading as the current parent directory.812c3ab8-94b0-4698-a9bf-9420af23ce24sh
21defense-evasionT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
22defense-evasionT1497.001System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
23defense-evasionT1070.002Clear Linux or Mac System Logs1rm -rf989cc1b1-3642-4260-a809-54f9dd559683sh
24defense-evasionT1070.002Clear Linux or Mac System Logs2Overwrite Linux Mail Spool1602ff76-ed7f-4c94-b550-2f727b4782d4bash
25defense-evasionT1070.002Clear Linux or Mac System Logs3Overwrite Linux Logd304b2dc-90b4-4465-a650-16ddd503f7b5bash
26defense-evasionT1070.003Clear Command History1Clear Bash history (rm)a934276e-2be5-4a36-93fd-98adbb5bd4fcsh
27defense-evasionT1070.003Clear Command History2Clear Bash history (echo)cbf506a5-dd78-43e5-be7e-a46b7c7a0a11sh
28defense-evasionT1070.003Clear Command History3Clear Bash history (cat dev/null)b1251c35-dcd3-4ea1-86da-36d27b54f31fsh
29defense-evasionT1070.003Clear Command History4Clear Bash history (ln dev/null)23d348f3-cc5c-4ba9-bd0a-ae09069f0914sh
30defense-evasionT1070.003Clear Command History5Clear Bash history (truncate)47966a1d-df4f-4078-af65-db6d9aa20739sh
31defense-evasionT1070.003Clear Command History6Clear history of a bunch of shells7e6721df-5f08-4370-9255-f06d8a77af4csh
32defense-evasionT1070.003Clear Command History7Clear and Disable Bash History Logging784e4011-bd1a-4ecd-a63a-8feb278512e6sh
33defense-evasionT1070.003Clear Command History8Use Space Before Command to Avoid Logging to History53b03a54-4529-4992-852d-a00b4b7215a6sh
34defense-evasionT1070.003Clear Command History9Disable Bash History Logging with SSH -T5f8abd62-f615-43c5-b6be-f780f25790a1sh
35defense-evasionT1140Deobfuscate/Decode Files or Information3Base64 decoding with Python356dc0e8-684f-4428-bb94-9313998ad608sh
36defense-evasionT1140Deobfuscate/Decode Files or Information4Base64 decoding with Perl6604d964-b9f6-4d4b-8ce8-499829a14d0ash
37defense-evasionT1140Deobfuscate/Decode Files or Information5Base64 decoding with shell utilitiesb4f6a567-a27a-41e5-b8ef-ac4b4008bb7esh
38defense-evasionT1140Deobfuscate/Decode Files or Information6Hex decoding with shell utilities005943f9-8dd5-4349-8b46-0313c0a9f973sh
39defense-evasionT1070.006Timestomp1Set a file's access timestamp5f9113d5-ed75-47ed-ba23-ea3573d05810sh
40defense-evasionT1070.006Timestomp2Set a file's modification timestamp20ef1523-8758-4898-b5a2-d026cc3d2c52sh
41defense-evasionT1070.006Timestomp3Set a file's creation timestamp8164a4a6-f99c-4661-ac4f-80f5e4e78d2bsh
42defense-evasionT1070.006Timestomp4Modify file timestamps using reference file631ea661-d661-44b0-abdb-7a7f3fc08e50sh
43defense-evasionT1562.004Disable or Modify System Firewall7Stop/Start UFW firewallfe135572-edcd-49a2-afe6-1d39521c5a9ash
44defense-evasionT1562.004Disable or Modify System Firewall8Stop/Start UFW firewall systemctl9fd99609-1854-4f3c-b47b-97d9a5972bd1sh
45defense-evasionT1562.004Disable or Modify System Firewall9Turn off UFW logging8a95b832-2c2a-494d-9cb0-dc9dd97c8badsh
46defense-evasionT1562.004Disable or Modify System Firewall10Add and delete UFW firewall rulesb2563a4e-c4b8-429c-8d47-d5bcb227ba7ash
47defense-evasionT1562.004Disable or Modify System Firewall11Edit UFW firewall user.rules filebeaf815a-c883-4194-97e9-fdbbb2bbdd7csh
48defense-evasionT1562.004Disable or Modify System Firewall12Edit UFW firewall ufw.conf filec1d8c4eb-88da-4927-ae97-c7c25893803bsh
49defense-evasionT1562.004Disable or Modify System Firewall13Edit UFW firewall sysctl.conf filec4ae0701-88d3-4cd8-8bce-4801ed9f97e4sh
50defense-evasionT1562.004Disable or Modify System Firewall14Edit UFW firewall main configuration file7b697ece-8270-46b5-bbc7-6b9e27081831sh
51defense-evasionT1562.004Disable or Modify System Firewall15Tail the UFW firewall log file419cca0c-fa52-4572-b0d7-bc7c6f388a27sh
52defense-evasionT1027.001Binary Padding1Pad Binary to Change Hash - Linux/macOS ddffe2346c-abd5-4b45-a713-bf5f1ebd573ash
53defense-evasionT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
54defense-evasionT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
55defense-evasionT1548.001Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
56defense-evasionT1548.001Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
57defense-evasionT1548.001Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
58defense-evasionT1548.001Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
59defense-evasionT1548.001Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
60defense-evasionT1562.006Indicator Blocking1Auditing Configuration Changes on Linux Host212cfbcf-4770-4980-bc21-303e37abd0e3bash
61defense-evasionT1562.006Indicator Blocking2Logging Configuration Changes on Linux Host7d40bc58-94c7-4fbb-88d9-ebce9fcdb60cbash
62defense-evasionT1562.003Impair Command History Logging1Disable history collection4eafdb45-0f79-4d66-aa86-a3e2c08791f5sh
63defense-evasionT1562.003Impair Command History Logging2Mac HISTCONTROL468566d5-83e5-40c1-b338-511e1659628dmanual
64defense-evasionT1562.001Disable or Modify Tools1Disable syslog4ce786f8-e601-44b5-bfae-9ebb15a7d1c8sh
65defense-evasionT1562.001Disable or Modify Tools2Disable Cb Responseae8943f7-0f8d-44de-962d-fbc2e2f03eb8sh
66defense-evasionT1562.001Disable or Modify Tools3Disable SELinuxfc225f36-9279-4c39-b3f9-5141ab74f8d8sh
67defense-evasionT1562.001Disable or Modify Tools4Stop Crowdstrike Falcon on Linux828a1278-81cc-4802-96ab-188bf29ca77dsh
68defense-evasionT1562.001Disable or Modify Tools25office-365-Disable-AntiPhishRuleb9bbae2c-2ba6-4cf3-b452-8e8f908696f3powershell
69defense-evasionT1027Obfuscated Files or Information1Decode base64 Data into Scriptf45df6be-2e1e-4136-a384-8f18ab3826fbsh
70defense-evasionT1036.003Rename System Utilities2Masquerading as Linux crond process.a315bfff-7a98-403b-b442-2ea1b255e556sh
71defense-evasionT1553.004Install Root Certificate1Install root CA on CentOS/RHEL9c096ec4-fd42-419d-a762-d64cc950627esh
72defense-evasionT1553.004Install Root Certificate2Install root CA on Debian/Ubuntu53bcf8a0-1549-4b85-b919-010c56d724ffsh
73defense-evasionT1027.004Compile After Delivery3C compiled0377aa6-850a-42b2-95f0-de558d80be57bash
74defense-evasionT1027.004Compile After Delivery4CC compileda97bb11-d6d0-4fc1-b445-e443d1346efebash
75defense-evasionT1027.004Compile After Delivery5Go compile78bd3fa7-773c-449e-a978-dc1f1500bc52bash
76defense-evasionT1562.008Disable Cloud Logs1AWS CloudTrail Changes9c10dc6b-20bd-403a-8e67-50ef7d07ed4esh
77defense-evasionT1562.008Disable Cloud Logs2Azure - Eventhub Deletion5e09bed0-7d33-453b-9bf3-caea32bff719powershell
78defense-evasionT1562.008Disable Cloud Logs3Office 365 - Exchange Audit Log Disabled1ee572f3-056c-4632-a7fc-7e7c42b1543cpowershell
79defense-evasionT1562.008Disable Cloud Logs4Disable CloudTrail Logging Through Event Selectors via Stratusa27418de-bdce-4ebd-b655-38f11142bf0csh
80defense-evasionT1562.008Disable Cloud Logs5AWS CloudWatch Log Group Deletes89422c87-b57b-4a04-a8ca-802bb9d06121sh
81defense-evasionT1562.008Disable Cloud Logs6AWS CloudWatch Log Stream Deletes33ca84bc-4259-4943-bd36-4655dc420932sh
82defense-evasionT1070.004File Deletion1Delete a single file - Linux/macOS562d737f-2fc6-4b09-8c2a-7f8ff0828480sh
83defense-evasionT1070.004File Deletion2Delete an entire folder - Linux/macOSa415f17e-ce8d-4ce2-a8b4-83b674e7017esh
84defense-evasionT1070.004File Deletion3Overwrite and delete a file with shred039b4b10-2900-404b-b67f-4b6d49aa6499sh
85defense-evasionT1070.004File Deletion8Delete Filesystem - Linuxf3aa95fe-4f10-4485-ad26-abf22a764c52bash
86defense-evasionT1027.002Software Packing1Binary simply packed by UPX (linux)11c46cd8-e471-450e-acb8-52a1216ae6a4sh
87defense-evasionT1027.002Software Packing2Binary packed by UPX, with modified headers (linux)f06197f8-ff46-48c2-a0c6-afc1b50665e1sh
88defense-evasionT1036.006Space after Filename2Space After Filenameb95ce2eb-a093-4cd8-938d-5258cef656eabash
89defense-evasionT1564.001Hidden Files and Directories1Create a hidden file in a hidden directory61a782e5-9a19-40b5-8ba4-69a4b9f3d7besh
90defense-evasionT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
91collectionT1560.001Archive via Utility5Data Compressed - nix - zipc51cec55-28dd-4ad2-9461-1eacbc82c3a0sh
92collectionT1560.001Archive via Utility6Data Compressed - nix - gzip Single Filecde3c2af-3485-49eb-9c1f-0ed60e9cc0afsh
93collectionT1560.001Archive via Utility7Data Compressed - nix - tar Folder or File7af2b51e-ad1c-498c-aca8-d3290c19535ash
94collectionT1560.001Archive via Utility8Data Encrypted with zip and gpg symmetric0286eb44-e7ce-41a0-b109-3da516e05a5fsh
95collectionT1113Screen Capture3X Windows Capture8206dd0c-faf6-4d74-ba13-7fbe13dce6acbash
96collectionT1113Screen Capture4Capture Linux Desktop using Import Tool9cd1cccb-91e4-4550-9139-e20a586fcea1bash
97collectionT1056.001Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
98collectionT1056.001Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
99collectionT1056.001Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
100collectionT1056.001Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
101collectionT1056.001Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
102collectionT1074.001Local Data Staging2Stage data from Discovery.sh39ce0303-ae16-4b9e-bb5b-4f53e8262066bash
103collectionT1530Data from Cloud Storage Object1Azure - Enumerate Azure Blobs with MicroBurst3dab4bcc-667f-4459-aea7-4162dd2d6590powershell
104collectionT1530Data from Cloud Storage Object2Azure - Scan for Anonymous Access to Azure Storage (Powershell)146af1f1-b74e-4aa7-9895-505eb559b4b0powershell
105collectionT1560.002Archive via Library1Compressing data using GZip in Python (Linux)391f5298-b12d-4636-8482-35d9c17d53a8bash
106collectionT1560.002Archive via Library2Compressing data using bz2 in Python (Linux)c75612b2-9de0-4d7c-879c-10d7b077072dbash
107collectionT1560.002Archive via Library3Compressing data using zipfile in Python (Linux)001a042b-859f-44d9-bf81-fd1c4e2200b0bash
108collectionT1560.002Archive via Library4Compressing data using tarfile in Python (Linux)e86f1b4b-fcc1-4a2a-ae10-b49da01458dbbash
109persistenceT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
110persistenceT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
111persistenceT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
112persistenceT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
113persistenceT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
114persistenceT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
115persistenceT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
116persistenceT1176Browser Extensions1Chrome (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
117persistenceT1176Browser Extensions2Chrome (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
118persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
119persistenceT1546.005Trap1Trapa74b2e07-5952-4c03-8b56-56274b076b61sh
120persistenceT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
121persistenceT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
122persistenceT1136.001Local Account1Create a user account on a Linux system40d8eabd-e394-46f6-8785-b9bfa1d011d2bash
123persistenceT1136.001Local Account5Create a new user in Linux with `root` UID and GID.a1040a30-d28b-4eda-bd99-bb2861a4616cbash
124persistenceT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcbash
125persistenceT1098.001Additional Cloud Credentials1Azure AD Application Hijacking - Service Principalb8e747c3-bdf7-4d71-bce2-f1df2a057406powershell
126persistenceT1098.001Additional Cloud Credentials2Azure AD Application Hijacking - App Registrationa12b5531-acab-4618-a470-0dafb294a87apowershell
127persistenceT1098.001Additional Cloud Credentials3AWS - Create Access Key and Secret Key8822c3b0-d9f9-4daf-a043-491160a31122sh
128persistenceT1136.003Cloud Account1AWS - Create a new IAM user8d1c2368-b503-40c9-9057-8e42f21c58adsh
129persistenceT1098Account Manipulation3AWS - Create a group and add a user to that group8822c3b0-d9f9-4daf-a043-49f110a31122sh
130persistenceT1098Account Manipulation4Azure - adding user to Azure AD role0e65ae27-5385-46b4-98ac-607a8ee82261powershell
131persistenceT1098Account Manipulation5Azure - adding service principal to Azure AD role92c40b3f-c406-4d1f-8d2b-c039bf5009e4powershell
132persistenceT1098Account Manipulation6Azure - adding user to Azure role in subscription1a94b3fc-b080-450a-b3d8-6d9b57b472eapowershell
133persistenceT1098Account Manipulation7Azure - adding service principal to Azure role in subscriptionc8f4bc29-a151-48da-b3be-4680af56f404powershell
134persistenceT1098Account Manipulation8AzureAD - adding permission to application94ea9cc3-81f9-4111-8dde-3fb54f36af4bpowershell
135persistenceT1547.006Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
136persistenceT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
137persistenceT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
138persistenceT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
139persistenceT1546.004Unix Shell Configuration Modification1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
140persistenceT1546.004Unix Shell Configuration Modification2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
141persistenceT1037.004RC Scripts2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
142persistenceT1037.004RC Scripts3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
143persistenceT1543.002Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
144persistenceT1543.002Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
145persistenceT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
146persistenceT1053.002At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
147privilege-escalationT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
148privilege-escalationT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
149privilege-escalationT1548.003Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
150privilege-escalationT1548.003Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
151privilege-escalationT1548.003Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
152privilege-escalationT1484.002Domain Trust Modification1Add Federation to Azure AD8906c5d0-3ee5-4f63-897a-f6cafd3fdbb7powershell
153privilege-escalationT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
154privilege-escalationT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
155privilege-escalationT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
156privilege-escalationT1611Escape to Host1Deploy container using nsenter container escape0b2f9520-a17a-4671-9dba-3bd034099fffsh
157privilege-escalationT1611Escape to Host2Mount host filesystem to escape privileged Docker container6c499943-b098-4bc6-8d38-0956fc182984sh
158privilege-escalationT1546.005Trap1Trapa74b2e07-5952-4c03-8b56-56274b076b61sh
159privilege-escalationT1574.006Dynamic Linker Hijacking1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
160privilege-escalationT1574.006Dynamic Linker Hijacking2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
161privilege-escalationT1548.001Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
162privilege-escalationT1548.001Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
163privilege-escalationT1548.001Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
164privilege-escalationT1548.001Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
165privilege-escalationT1548.001Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
166privilege-escalationT1547.006Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
167privilege-escalationT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
168privilege-escalationT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
169privilege-escalationT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
170privilege-escalationT1546.004Unix Shell Configuration Modification1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
171privilege-escalationT1546.004Unix Shell Configuration Modification2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
172privilege-escalationT1037.004RC Scripts2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
173privilege-escalationT1037.004RC Scripts3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
174privilege-escalationT1543.002Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
175privilege-escalationT1543.002Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
176privilege-escalationT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
177privilege-escalationT1053.002At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
178credential-accessT1556.003Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
179credential-accessT1556.003Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
180credential-accessT1056.001Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
181credential-accessT1056.001Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
182credential-accessT1056.001Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
183credential-accessT1056.001Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
184credential-accessT1056.001Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
185credential-accessT1110.001Password Guessing3Brute Force Credentials of single Azure AD user5a51ef57-299e-4d62-8e11-2d440df55e69powershell
186credential-accessT1110.001Password Guessing4SUDO brute force Debian464b63e8-bf1f-422e-9e2c-2aa5080b6f9ash
187credential-accessT1110.001Password Guessing5SUDO brute force Redhatb72958a7-53e3-4809-9ee1-58f6ecd99adesh
188credential-accessT1552.005Cloud Instance Metadata API1Azure - Search Azure AD User Attributes for Passwordsae9b2e3e-efa1-4483-86e2-fae529ab9fb6powershell
189credential-accessT1606.002SAML Tokens1Golden SAMLb16a03bc-1089-4dcc-ad98-30fe8f3a2b31powershell
190credential-accessT1003.007Proc Filesystem1Dump individual process memory with sh (Local)7e91138a-8e74-456d-a007-973d67a0bb80sh
191credential-accessT1003.007Proc Filesystem2Dump individual process memory with Python (Local)437b2003-a20d-4ed8-834c-4964f24eec63sh
192credential-accessT1003.007Proc Filesystem3Capture Passwords with MimiPenguina27418de-bdce-4ebd-b655-38f04842bf0cbash
193credential-accessT1040Network Sniffing1Packet Capture Linux7fe741f7-b265-4951-a7c7-320889083b3ebash
194credential-accessT1555.003Credentials from Web Browsers9LaZagne.py - Dump Credentials from Firefox Browser87e88698-621b-4c45-8a89-4eaebdeaabb1sh
195credential-accessT1552.004Private Keys2Discover Private SSH Keys46959285-906d-40fa-9437-5a439accd878sh
196credential-accessT1552.004Private Keys3Copy Private SSH Keys with CP7c247dc7-5128-4643-907b-73a76d9135c3sh
197credential-accessT1552.004Private Keys4Copy Private SSH Keys with rsync864bb0b2-6bb5-489a-b43b-a77b3a16d68ash
198credential-accessT1552.004Private Keys5Copy the users GnuPG directory with rsync2a5a0601-f5fb-4e2e-aa09-73282ae6afcash
199credential-accessT1110.003Password Spraying4Password spray all Azure AD users with a single passworda8aa2d3e-1c52-4016-bc73-0f8854cfa80apowershell
200credential-accessT1110.003Password Spraying7Password Spray Microsoft Online Accounts with MSOLSpray (Azure/O365)f3a10056-0160-4785-8744-d9bd7c12dc39powershell
201credential-accessT1552.003Bash History1Search Through Bash History3cfde62b-7c33-4b26-a61e-755d6131c8cesh
202credential-accessT1552.001Credentials In Files2Extract passwords with grepbd4cf0d1-7646-474e-8610-78ccf5a097c4sh
203credential-accessT1552.001Credentials In Files5Find and Access Github Credentialsda4f751a-020b-40d7-b9ff-d433b7799803bash
204credential-accessT1110.004Credential Stuffing1SSH Credential Stuffing From Linux4f08197a-2a8a-472d-9589-cd2895ef22adbash
205credential-accessT1003.008/etc/passwd and /etc/shadow1Access /etc/shadow (Local)3723ab77-c546-403c-8fb4-bb577033b235bash
206credential-accessT1003.008/etc/passwd and /etc/shadow2Access /etc/passwd (Local)60e860b6-8ae6-49db-ad07-5e73edd88f5dsh
207credential-accessT1003.008/etc/passwd and /etc/shadow3Access /etc/{shadow,passwd} with a standard bin that's not catdf1a55ae-019d-4120-bc35-94f4bc5c4b0abash
208credential-accessT1003.008/etc/passwd and /etc/shadow4Access /etc/{shadow,passwd} with shell builtinsf5aa6543-6cb2-4fae-b9c2-b96e14721713bash
209credential-accessT1552.007Container API1ListSecrets43c3a49d-d15c-45e6-b303-f6e177e44a9abash
210credential-accessT1552.007Container API2Cat the contents of a Kubernetes service account token file788e0019-a483-45da-bcfe-96353d46820fsh
211discoveryT1033System Owner/User Discovery2System Owner/User Discovery2a9b677d-a230-44f4-ad86-782df1ef108csh
212discoveryT1087.001Local Account1Enumerate all accounts (Local)f8aab3dd-5990-4bf8-b8ab-2226c951696fsh
213discoveryT1087.001Local Account2View sudoers accessfed9be70-0186-4bde-9f8a-20945f9370c2sh
214discoveryT1087.001Local Account3View accounts with UID 0c955a599-3653-4fe5-b631-f11c00eb0397sh
215discoveryT1087.001Local Account4List opened files by user7e46c7a5-0142-45be-a858-1a3ecb4fd3cbsh
216discoveryT1087.001Local Account5Show if a user account has ever logged in remotely0f0b6a29-08c3-44ad-a30b-47fd996b2110sh
217discoveryT1087.001Local Account6Enumerate users and groupse6f36545-dc1e-47f0-9f48-7f730f54a02esh
218discoveryT1497.001System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
219discoveryT1007System Service Discovery3System Service Discovery - systemctlf4b26bce-4c2c-46c0-bcc5-fce062d38befbash
220discoveryT1040Network Sniffing1Packet Capture Linux7fe741f7-b265-4951-a7c7-320889083b3ebash
221discoveryT1135Network Share Discovery2Network Share Discovery - linux875805bc-9e86-4e87-be86-3a5527315caebash
222discoveryT1082System Information Discovery3List OS Informationcccb070c-df86-4216-a5bc-9fb60c74e27csh
223discoveryT1082System Information Discovery4Linux VM Check via Hardware31dad7ad-2286-4c02-ae92-274418c85fecbash
224discoveryT1082System Information Discovery5Linux VM Check via Kernel Modules8057d484-0fae-49a4-8302-4812c4f1e64ebash
225discoveryT1082System Information Discovery7Hostname Discovery486e88ea-4f56-470f-9b57-3f4d73f39133bash
226discoveryT1082System Information Discovery11Environment variables discovery on macos and linuxfcbdd43f-f4ad-42d5-98f3-0218097e2720sh
227discoveryT1082System Information Discovery23Azure Security Scan with SkyArk26a18d3d-f8bc-486b-9a33-d6df5d78a594powershell
228discoveryT1217Browser Bookmark Discovery1List Mozilla Firefox Bookmark Database Files on Linux3a41f169-a5ab-407f-9269-abafdb5da6c2sh
229discoveryT1016System Network Configuration Discovery3System Network Configuration Discoveryc141bbdb-7fca-4254-9fd6-f47e79447e17sh
230discoveryT1083File and Directory Discovery3Nix File and Directory Discoveryffc8b249-372a-4b74-adcd-e4c0430842desh
231discoveryT1083File and Directory Discovery4Nix File and Directory Discovery 213c5e1ae-605b-46c4-a79f-db28c77ff24esh
232discoveryT1049System Network Connections Discovery3System Network Connections Discovery Linux & MacOS9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2sh
233discoveryT1057Process Discovery1Process Discovery - ps4ff64f0b-aaf2-4866-b39d-38d9791407ccsh
234discoveryT1069.001Local Groups1Permission Groups Discovery (Local)952931a4-af0b-4335-bbbe-73c8c5b327aesh
235discoveryT1201Password Policy Discovery1Examine password complexity policy - Ubuntu085fe567-ac84-47c7-ac4c-2688ce28265bbash
236discoveryT1201Password Policy Discovery2Examine password complexity policy - CentOS/RHEL 7.x78a12e65-efff-4617-bc01-88f17d71315dbash
237discoveryT1201Password Policy Discovery3Examine password complexity policy - CentOS/RHEL 6.x6ce12552-0adb-4f56-89ff-95ce268f6358bash
238discoveryT1201Password Policy Discovery4Examine password expiration policy - All Linux7c86c55c-70fa-4a05-83c9-3aa19b145d1abash
239discoveryT1518.001Security Software Discovery4Security Software Discovery - ps (Linux)23b91cd2-c99c-4002-9e41-317c63e024a2sh
240discoveryT1526Cloud Service Discovery1Azure - Dump Subscription Data with MicroBurst1e40bb1d-195e-401e-a86b-c192f55e005cpowershell
241discoveryT1018Remote System Discovery6Remote System Discovery - arp nixacb6b1ff-e2ad-4d64-806c-6c35fe73b951sh
242discoveryT1018Remote System Discovery7Remote System Discovery - sweep96db2632-8417-4dbb-b8bb-a8b92ba391desh
243discoveryT1018Remote System Discovery12Remote System Discovery - ip neighbour158bd4dd-6359-40ab-b13c-285b9ef6fa25sh
244discoveryT1018Remote System Discovery13Remote System Discovery - ip route1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1sh
245discoveryT1018Remote System Discovery14Remote System Discovery - ip tcp_metrics6c2da894-0b57-43cb-87af-46ea3b501388sh
246discoveryT1046Network Service Discovery1Port Scan68e907da-2539-48f6-9fc9-257a78c05540bash
247discoveryT1046Network Service Discovery2Port Scan Nmap515942b0-a09f-4163-a7bb-22fefb6f185fsh
248command-and-controlT1132.001Standard Encoding1Base64 Encoded data.1164f70f-9a88-4dff-b9ff-dc70e7bf0c25sh
249command-and-controlT1090.003Multi-hop Proxy3Tor Proxy Usage - Debian/Ubuntu5ff9d047-6e9c-4357-b39b-5cf89d9b59c7sh
250command-and-controlT1571Non-Standard Port2Testing usage of uncommonly used port5db21e1d-dd9c-4a50-b885-b1e748912767sh
251command-and-controlT1071.001Web Protocols3Malicious User Agents - Nix2d7c471a-e887-4b78-b0dc-b0df1f2e0658sh
252command-and-controlT1105Ingress Tool Transfer1rsync remote file copy (push)0fc6e977-cb12-44f6-b263-2824ba917409bash
253command-and-controlT1105Ingress Tool Transfer2rsync remote file copy (pull)3180f7d5-52c0-4493-9ea0-e3431a84773fbash
254command-and-controlT1105Ingress Tool Transfer3scp remote file copy (push)83a49600-222b-4866-80a0-37736ad29344bash
255command-and-controlT1105Ingress Tool Transfer4scp remote file copy (pull)b9d22b9a-9778-4426-abf0-568ea64e9c33bash
256command-and-controlT1105Ingress Tool Transfer5sftp remote file copy (push)f564c297-7978-4aa9-b37a-d90477feea4ebash
257command-and-controlT1105Ingress Tool Transfer6sftp remote file copy (pull)0139dba1-f391-405e-a4f5-f3989f2c88efbash
258command-and-controlT1105Ingress Tool Transfer14whois file downloadc99a829f-0bb8-4187-b2c6-d47d1df74cabsh
259command-and-controlT1090.001Internal Proxy1Connection Proxy0ac21132-4485-4212-a681-349e8a6637cdsh
260impactT1486Data Encrypted for Impact1Encrypt files using gpg (Linux)7b8ce084-3922-4618-8d22-95f996173765bash
261impactT1486Data Encrypted for Impact2Encrypt files using 7z (Linux)53e6735a-4727-44cc-b35b-237682a151adbash
262impactT1486Data Encrypted for Impact3Encrypt files using ccrypt (Linux)08cbf59f-85da-4369-a5f4-049cffd7709fbash
263impactT1486Data Encrypted for Impact4Encrypt files using openssl (Linux)142752dc-ca71-443b-9359-cf6f497315f1bash
264impactT1496Resource Hijacking1macOS/Linux - Simulate CPU Load with Yes904a5a0e-fb02-490d-9f8d-0e256eb37549bash
265impactT1485Data Destruction2macOS/Linux - Overwrite file with DD38deee99-fd65-4031-bec8-bfa4f9f26146bash
266impactT1529System Shutdown/Reboot3Restart System via `shutdown` - macOS/Linux6326dbc4-444b-4c04-88f4-27e94d0327cbbash
267impactT1529System Shutdown/Reboot4Shutdown System via `shutdown` - macOS/Linux4963a81e-a3ad-4f02-adda-812343b351debash
268impactT1529System Shutdown/Reboot5Restart System via `reboot` - macOS/Linux47d0b042-a918-40ab-8cf9-150ffe919027bash
269impactT1529System Shutdown/Reboot6Shutdown System via `halt` - Linux918f70ab-e1ef-49ff-bc57-b27021df84ddbash
270impactT1529System Shutdown/Reboot7Reboot System via `halt` - Linux78f92e14-f1e9-4446-b3e9-f1b921f2459ebash
271impactT1529System Shutdown/Reboot8Shutdown System via `poweroff` - Linux73a90cd2-48a2-4ac5-8594-2af35fa909fabash
272impactT1529System Shutdown/Reboot9Reboot System via `poweroff` - Linux61303105-ff60-427b-999e-efb90b314e41bash
273executionT1053.007Container Orchestration Job1ListCronjobsddfb0bc1-3c3f-47e9-a298-550ecfefacbdbash
274executionT1053.007Container Orchestration Job2CreateCronjobf2fa019e-fb2a-4d28-9dc6-fd1a9b7f68c3bash
275executionT1053.003Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
276executionT1053.003Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
277executionT1053.003Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
278executionT1609Container Administration Command1ExecIntoContainerd03bfcd3-ed87-49c8-8880-44bb772dea4bbash
279executionT1053.006Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
280executionT1053.006Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
281executionT1053.006Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
282executionT1059.004Unix Shell1Create and Execute Bash Shell Script7e7ac3ed-f795-4fa5-b711-09d6fbe9b873sh
283executionT1059.004Unix Shell2Command-Line Interfaced0c88567-803d-4dca-99b4-7ce65e7b257csh
284executionT1059.004Unix Shell3Harvest SUID executable files46274fc6-08a7-4956-861b-24cbbaa0503csh
285executionT1059.004Unix Shell4LinEnum tool executiona2b35a63-9df1-4806-9a4d-5fe0500845f2sh
286executionT1059.006Python1Execute shell script via python's command mode arguement3a95cdb2-c6ea-4761-b24e-02b71889b8bbsh
287executionT1059.006Python2Execute Python via scripts (Linux)6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8sh
288executionT1059.006Python3Execute Python via Python executables (Linux)0b44d79b-570a-4b27-a31f-3bf2156e5eaash
289executionT1059.006Python4Python pty module and spawn function used to spawn sh or bash161d694c-b543-4434-85c3-c3a433e33792bash
290executionT1053.002At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
291initial-accessT1078.004Cloud Accounts1Creating GCP Service Account and Service Account Key9fdd83fd-bd53-46e5-a716-9dec89c8ae8egcloud
292exfiltrationT1048.002Exfiltration Over Asymmetric Encrypted Non-C2 Protocol2Exfiltrate data HTTPS using curl linux4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01bash
293exfiltrationT1048Exfiltration Over Alternative Protocol1Exfiltration Over Alternative Protocol - SSHf6786cc8-beda-4915-a4d6-ac2f193bb988sh
294exfiltrationT1048Exfiltration Over Alternative Protocol2Exfiltration Over Alternative Protocol - SSH7c3cb337-35ae-4d06-bf03-3032ed2ec268sh
295exfiltrationT1030Data Transfer Size Limits1Data Transfer Size Limitsab936c51-10f4-46ce-9144-e02137b2016ash
296exfiltrationT1048.003Exfiltration Over Unencrypted Non-C2 Protocol1Exfiltration Over Alternative Protocol - HTTP1d1abbd6-a3d3-4b2e-bef5-c59293f46effmanual
297exfiltrationT1048.003Exfiltration Over Unencrypted Non-C2 Protocol3Exfiltration Over Alternative Protocol - DNSc403b5a4-b5fc-49f2-b181-d1c80d27db45manual