Files
atomic-red-team/atomics/Indexes/Indexes-CSV/linux-index.csv
T
2023-02-16 16:27:28 +00:00

40 KiB

1TacticTechnique #Technique NameTest #Test NameTest GUIDExecutor Name
2defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
3defense-evasionT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
4defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification1chmod - Change file or folder mode (numeric mode)34ca1464-de9d-40c6-8c77-690adf36a135bash
5defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification2chmod - Change file or folder mode (symbolic mode)fc9d6695-d022-4a80-91b1-381f5c35aff3bash
6defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification3chmod - Change file or folder mode (numeric mode) recursivelyea79f937-4a4d-4348-ace6-9916aec453a4bash
7defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification4chmod - Change file or folder mode (symbolic mode) recursively0451125c-b5f6-488f-993b-5a32b09f7d8fbash
8defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification5chown - Change file or folder ownership and groupd169e71b-85f9-44ec-8343-27093ff3dfc0bash
9defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification6chown - Change file or folder ownership and group recursivelyb78598be-ff39-448f-a463-adbf2a5b7848bash
10defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification7chown - Change file or folder mode ownership only967ba79d-f184-4e0e-8d09-6362b3162e99bash
11defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification8chown - Change file or folder ownership recursively3b015515-b3d8-44e9-b8cd-6fa84faf30b2bash
12defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification9chattr - Remove immutable file attributee7469fe2-ad41-4382-8965-99b94dd3c13fsh
13defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification10Chmod through c script973631cf-6680-4ffa-a053-045e1b6b67absh
14defense-evasionT1222.002File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification11Chown through c script18592ba1-5f88-4e3c-abc8-ab1c6042e389sh
15defense-evasionT1014Rootkit1Loadable Kernel Module based Rootkitdfb50072-e45a-4c75-a17e-a484809c8553sh
16defense-evasionT1014Rootkit2Loadable Kernel Module based Rootkit75483ef8-f10f-444a-bf02-62eb0e48db6fsh
17defense-evasionT1014Rootkit3dynamic-linker based rootkit (libprocesshider)1338bf0c-fd0c-48c0-9e65-329f18e2c0d3sh
18defense-evasionT1014Rootkit4Loadable Kernel Module based Rootkit (Diamorphine)0b996469-48c6-46e2-8155-a17f8b6c2247sh
19defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
20defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
21defense-evasionT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
22defense-evasionT1036.005Masquerading: Match Legitimate Name or Location1Execute a process from a directory masquerading as the current parent directory.812c3ab8-94b0-4698-a9bf-9420af23ce24sh
23defense-evasionT1497.001Virtualization/Sandbox Evasion: System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
24defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs1rm -rf989cc1b1-3642-4260-a809-54f9dd559683sh
25defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs2Overwrite Linux Mail Spool1602ff76-ed7f-4c94-b550-2f727b4782d4bash
26defense-evasionT1070.002Indicator Removal on Host: Clear Linux or Mac System Logs3Overwrite Linux Logd304b2dc-90b4-4465-a650-16ddd503f7b5bash
27defense-evasionT1070.003Indicator Removal on Host: Clear Command History1Clear Bash history (rm)a934276e-2be5-4a36-93fd-98adbb5bd4fcsh
28defense-evasionT1070.003Indicator Removal on Host: Clear Command History2Clear Bash history (echo)cbf506a5-dd78-43e5-be7e-a46b7c7a0a11sh
29defense-evasionT1070.003Indicator Removal on Host: Clear Command History3Clear Bash history (cat dev/null)b1251c35-dcd3-4ea1-86da-36d27b54f31fsh
30defense-evasionT1070.003Indicator Removal on Host: Clear Command History4Clear Bash history (ln dev/null)23d348f3-cc5c-4ba9-bd0a-ae09069f0914sh
31defense-evasionT1070.003Indicator Removal on Host: Clear Command History5Clear Bash history (truncate)47966a1d-df4f-4078-af65-db6d9aa20739sh
32defense-evasionT1070.003Indicator Removal on Host: Clear Command History6Clear history of a bunch of shells7e6721df-5f08-4370-9255-f06d8a77af4csh
33defense-evasionT1070.003Indicator Removal on Host: Clear Command History7Clear and Disable Bash History Logging784e4011-bd1a-4ecd-a63a-8feb278512e6sh
34defense-evasionT1070.003Indicator Removal on Host: Clear Command History8Use Space Before Command to Avoid Logging to History53b03a54-4529-4992-852d-a00b4b7215a6sh
35defense-evasionT1070.003Indicator Removal on Host: Clear Command History9Disable Bash History Logging with SSH -T5f8abd62-f615-43c5-b6be-f780f25790a1sh
36defense-evasionT1140Deobfuscate/Decode Files or Information3Base64 decoding with Python356dc0e8-684f-4428-bb94-9313998ad608sh
37defense-evasionT1140Deobfuscate/Decode Files or Information4Base64 decoding with Perl6604d964-b9f6-4d4b-8ce8-499829a14d0ash
38defense-evasionT1140Deobfuscate/Decode Files or Information5Base64 decoding with shell utilitiesb4f6a567-a27a-41e5-b8ef-ac4b4008bb7esh
39defense-evasionT1140Deobfuscate/Decode Files or Information6Hex decoding with shell utilities005943f9-8dd5-4349-8b46-0313c0a9f973sh
40defense-evasionT1070.006Indicator Removal on Host: Timestomp1Set a file's access timestamp5f9113d5-ed75-47ed-ba23-ea3573d05810sh
41defense-evasionT1070.006Indicator Removal on Host: Timestomp2Set a file's modification timestamp20ef1523-8758-4898-b5a2-d026cc3d2c52sh
42defense-evasionT1070.006Indicator Removal on Host: Timestomp3Set a file's creation timestamp8164a4a6-f99c-4661-ac4f-80f5e4e78d2bsh
43defense-evasionT1070.006Indicator Removal on Host: Timestomp4Modify file timestamps using reference file631ea661-d661-44b0-abdb-7a7f3fc08e50sh
44defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall7Stop/Start UFW firewallfe135572-edcd-49a2-afe6-1d39521c5a9ash
45defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall8Stop/Start UFW firewall systemctl9fd99609-1854-4f3c-b47b-97d9a5972bd1sh
46defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall9Turn off UFW logging8a95b832-2c2a-494d-9cb0-dc9dd97c8badsh
47defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall10Add and delete UFW firewall rulesb2563a4e-c4b8-429c-8d47-d5bcb227ba7ash
48defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall11Edit UFW firewall user.rules filebeaf815a-c883-4194-97e9-fdbbb2bbdd7csh
49defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall12Edit UFW firewall ufw.conf filec1d8c4eb-88da-4927-ae97-c7c25893803bsh
50defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall13Edit UFW firewall sysctl.conf filec4ae0701-88d3-4cd8-8bce-4801ed9f97e4sh
51defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall14Edit UFW firewall main configuration file7b697ece-8270-46b5-bbc7-6b9e27081831sh
52defense-evasionT1562.004Impair Defenses: Disable or Modify System Firewall15Tail the UFW firewall log file419cca0c-fa52-4572-b0d7-bc7c6f388a27sh
53defense-evasionT1027.001Obfuscated Files or Information: Binary Padding1Pad Binary to Change Hash - Linux/macOS ddffe2346c-abd5-4b45-a713-bf5f1ebd573ash
54defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
55defense-evasionT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
56defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
57defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
58defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
59defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
60defense-evasionT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
61defense-evasionT1562.006Impair Defenses: Indicator Blocking1Auditing Configuration Changes on Linux Host212cfbcf-4770-4980-bc21-303e37abd0e3bash
62defense-evasionT1562.006Impair Defenses: Indicator Blocking2Logging Configuration Changes on Linux Host7d40bc58-94c7-4fbb-88d9-ebce9fcdb60cbash
63defense-evasionT1562.003Impair Defenses: HISTCONTROL1Disable history collection4eafdb45-0f79-4d66-aa86-a3e2c08791f5sh
64defense-evasionT1562.003Impair Defenses: HISTCONTROL2Mac HISTCONTROL468566d5-83e5-40c1-b338-511e1659628dmanual
65defense-evasionT1562.001Impair Defenses: Disable or Modify Tools1Disable syslog4ce786f8-e601-44b5-bfae-9ebb15a7d1c8sh
66defense-evasionT1562.001Impair Defenses: Disable or Modify Tools2Disable Cb Responseae8943f7-0f8d-44de-962d-fbc2e2f03eb8sh
67defense-evasionT1562.001Impair Defenses: Disable or Modify Tools3Disable SELinuxfc225f36-9279-4c39-b3f9-5141ab74f8d8sh
68defense-evasionT1562.001Impair Defenses: Disable or Modify Tools4Stop Crowdstrike Falcon on Linux828a1278-81cc-4802-96ab-188bf29ca77dsh
69defense-evasionT1027Obfuscated Files or Information1Decode base64 Data into Scriptf45df6be-2e1e-4136-a384-8f18ab3826fbsh
70defense-evasionT1036.003Masquerading: Rename System Utilities2Masquerading as Linux crond process.a315bfff-7a98-403b-b442-2ea1b255e556sh
71defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate1Install root CA on CentOS/RHEL9c096ec4-fd42-419d-a762-d64cc950627esh
72defense-evasionT1553.004Subvert Trust Controls: Install Root Certificate2Install root CA on Debian/Ubuntu53bcf8a0-1549-4b85-b919-010c56d724ffsh
73defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery3C compiled0377aa6-850a-42b2-95f0-de558d80be57bash
74defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery4CC compileda97bb11-d6d0-4fc1-b445-e443d1346efebash
75defense-evasionT1027.004Obfuscated Files or Information: Compile After Delivery5Go compile78bd3fa7-773c-449e-a978-dc1f1500bc52bash
76defense-evasionT1070.004Indicator Removal on Host: File Deletion1Delete a single file - Linux/macOS562d737f-2fc6-4b09-8c2a-7f8ff0828480sh
77defense-evasionT1070.004Indicator Removal on Host: File Deletion2Delete an entire folder - Linux/macOSa415f17e-ce8d-4ce2-a8b4-83b674e7017esh
78defense-evasionT1070.004Indicator Removal on Host: File Deletion3Overwrite and delete a file with shred039b4b10-2900-404b-b67f-4b6d49aa6499sh
79defense-evasionT1070.004Indicator Removal on Host: File Deletion8Delete Filesystem - Linuxf3aa95fe-4f10-4485-ad26-abf22a764c52bash
80defense-evasionT1027.002Obfuscated Files or Information: Software Packing1Binary simply packed by UPX (linux)11c46cd8-e471-450e-acb8-52a1216ae6a4sh
81defense-evasionT1027.002Obfuscated Files or Information: Software Packing2Binary packed by UPX, with modified headers (linux)f06197f8-ff46-48c2-a0c6-afc1b50665e1sh
82defense-evasionT1036.006Masquerading: Space after Filename2Space After Filenameb95ce2eb-a093-4cd8-938d-5258cef656eabash
83defense-evasionT1564.001Hide Artifacts: Hidden Files and Directories1Create a hidden file in a hidden directory61a782e5-9a19-40b5-8ba4-69a4b9f3d7besh
84collectionT1560.001Archive Collected Data: Archive via Utility5Data Compressed - nix - zipc51cec55-28dd-4ad2-9461-1eacbc82c3a0sh
85collectionT1560.001Archive Collected Data: Archive via Utility6Data Compressed - nix - gzip Single Filecde3c2af-3485-49eb-9c1f-0ed60e9cc0afsh
86collectionT1560.001Archive Collected Data: Archive via Utility7Data Compressed - nix - tar Folder or File7af2b51e-ad1c-498c-aca8-d3290c19535ash
87collectionT1560.001Archive Collected Data: Archive via Utility8Data Encrypted with zip and gpg symmetric0286eb44-e7ce-41a0-b109-3da516e05a5fsh
88collectionT1113Screen Capture3X Windows Capture8206dd0c-faf6-4d74-ba13-7fbe13dce6acbash
89collectionT1113Screen Capture4Capture Linux Desktop using Import Tool9cd1cccb-91e4-4550-9139-e20a586fcea1bash
90collectionT1056.001Input Capture: Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
91collectionT1056.001Input Capture: Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
92collectionT1056.001Input Capture: Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
93collectionT1056.001Input Capture: Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
94collectionT1056.001Input Capture: Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
95collectionT1074.001Data Staged: Local Data Staging2Stage data from Discovery.sh39ce0303-ae16-4b9e-bb5b-4f53e8262066bash
96collectionT1115Clipboard Data5Add or copy content to clipboard with xClipee363e53-b083-4230-aff3-f8d955f2d5bbsh
97collectionT1560.002Archive Collected Data: Archive via Library1Compressing data using GZip in Python (Linux)391f5298-b12d-4636-8482-35d9c17d53a8bash
98collectionT1560.002Archive Collected Data: Archive via Library2Compressing data using bz2 in Python (Linux)c75612b2-9de0-4d7c-879c-10d7b077072dbash
99collectionT1560.002Archive Collected Data: Archive via Library3Compressing data using zipfile in Python (Linux)001a042b-859f-44d9-bf81-fd1c4e2200b0bash
100collectionT1560.002Archive Collected Data: Archive via Library4Compressing data using tarfile in Python (Linux)e86f1b4b-fcc1-4a2a-ae10-b49da01458dbbash
101persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
102persistenceT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
103persistenceT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
104persistenceT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
105persistenceT1053.003Scheduled Task/Job: Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
106persistenceT1176Browser Extensions1Chrome (Developer Mode)3ecd790d-2617-4abf-9a8c-4e8d47da9ee1manual
107persistenceT1176Browser Extensions2Chrome (Chrome Web Store)4c83940d-8ca5-4bb2-8100-f46dc914bc3fmanual
108persistenceT1176Browser Extensions3Firefoxcb790029-17e6-4c43-b96f-002ce5f10938manual
109persistenceT1546.005Event Triggered Execution: Trap1Trap EXITa74b2e07-5952-4c03-8b56-56274b076b61sh
110persistenceT1546.005Event Triggered Execution: Trap2Trap SIGINTa547d1ba-1d7a-4cc5-a9cb-8d65e8809636sh
111persistenceT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
112persistenceT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
113persistenceT1136.001Create Account: Local Account1Create a user account on a Linux system40d8eabd-e394-46f6-8785-b9bfa1d011d2bash
114persistenceT1136.001Create Account: Local Account5Create a new user in Linux with `root` UID and GID.a1040a30-d28b-4eda-bd99-bb2861a4616cbash
115persistenceT1098.004SSH Authorized Keys1Modify SSH Authorized Keys342cc723-127c-4d3a-8292-9c0c6b4ecadcbash
116persistenceT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
117persistenceT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
118persistenceT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
119persistenceT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
120persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
121persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
122persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc3Append to the system shell profile694b3cc8-6a78-4d35-9e74-0123d009e94bsh
123persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc4Append commands user shell profilebbdb06bc-bab6-4f5b-8232-ba3fbed51d77sh
124persistenceT1546.004Event Triggered Execution: .bash_profile and .bashrc5System shell profile scripts8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4sh
125persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
126persistenceT1037.004Boot or Logon Initialization Scripts: Rc.common3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
127persistenceT1543.002Create or Modify System Process: Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
128persistenceT1543.002Create or Modify System Process: Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
129persistenceT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
130privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching1Sudo usage150c3a08-ee6e-48a6-aeaf-3659d24ceb4esh
131privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching2Unlimited sudo cache timeouta7b17659-dd5e-46f7-b7d1-e6792c91d0bcsh
132privilege-escalationT1548.003Abuse Elevation Control Mechanism: Sudo and Sudo Caching3Disable tty_tickets for sudo caching91a60b03-fb75-4d24-a42e-2eb8956e8de1sh
133privilege-escalationT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
134privilege-escalationT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
135privilege-escalationT1053.003Scheduled Task/Job: Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
136privilege-escalationT1546.005Event Triggered Execution: Trap1Trap EXITa74b2e07-5952-4c03-8b56-56274b076b61sh
137privilege-escalationT1546.005Event Triggered Execution: Trap2Trap SIGINTa547d1ba-1d7a-4cc5-a9cb-8d65e8809636sh
138privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD1Shared Library Injection via /etc/ld.so.preload39cb0e67-dd0d-4b74-a74b-c072db7ae991bash
139privilege-escalationT1574.006Hijack Execution Flow: LD_PRELOAD2Shared Library Injection via LD_PRELOADbc219ff7-789f-4d51-9142-ecae3397deaebash
140privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid1Make and modify binary from C source896dfe97-ae43-4101-8e96-9a7996555d80sh
141privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid2Set a SetUID flag on file759055b3-3885-4582-a8ec-c00c9d64dd79sh
142privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid3Set a SetGID flag on filedb55f666-7cba-46c6-9fe6-205a05c3242csh
143privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid4Make and modify capabilities of a binarydb53959c-207d-4000-9e7a-cd8eb417e072sh
144privilege-escalationT1548.001Abuse Elevation Control Mechanism: Setuid and Setgid5Provide the SetUID capability to a file1ac3272f-9bcf-443a-9888-4b1d3de785c1sh
145privilege-escalationT1547.006Boot or Logon Autostart Execution: Kernel Modules and Extensions1Linux - Load Kernel Module via insmod687dcb93-9656-4853-9c36-9977315e9d23bash
146privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
147privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
148privilege-escalationT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
149privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc1Add command to .bash_profile94500ae1-7e31-47e3-886b-c328da46872fsh
150privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc2Add command to .bashrc0a898315-4cfa-4007-bafe-33a4646d115fsh
151privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc3Append to the system shell profile694b3cc8-6a78-4d35-9e74-0123d009e94bsh
152privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc4Append commands user shell profilebbdb06bc-bab6-4f5b-8232-ba3fbed51d77sh
153privilege-escalationT1546.004Event Triggered Execution: .bash_profile and .bashrc5System shell profile scripts8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4sh
154privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common2rc.commonc33f3d80-5f04-419b-a13a-854d1cbdbf3abash
155privilege-escalationT1037.004Boot or Logon Initialization Scripts: Rc.common3rc.local126f71af-e1c9-405c-94ef-26a47b16c102bash
156privilege-escalationT1543.002Create or Modify System Process: Systemd Service1Create Systemd Serviced9e4f24f-aa67-4c6e-bcbf-85622b697a7cbash
157privilege-escalationT1543.002Create or Modify System Process: Systemd Service2Create Systemd Service file, Enable the service , Modify and Reload the service.c35ac4a8-19de-43af-b9f8-755da7e89c89bash
158privilege-escalationT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
159credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules1Malicious PAM rule4b9dde80-ae22-44b1-a82a-644bf009eb9csh
160credential-accessT1556.003Modify Authentication Process: Pluggable Authentication Modules2Malicious PAM module65208808-3125-4a2e-8389-a0a00e9ab326sh
161credential-accessT1056.001Input Capture: Keylogging2Living off the land Terminal Input Capture on Linux with pam.d9c6bdb34-a89f-4b90-acb1-5970614c711bsh
162credential-accessT1056.001Input Capture: Keylogging3Logging bash history to syslog0e59d59d-3265-4d35-bebd-bf5c1ec40db5sh
163credential-accessT1056.001Input Capture: Keylogging4Bash session based keylogger7f85a946-a0ea-48aa-b6ac-8ff539278258sh
164credential-accessT1056.001Input Capture: Keylogging5SSHD PAM keylogger81d7d2ad-d644-4b6a-bea7-28ffe43beccash
165credential-accessT1056.001Input Capture: Keylogging6Auditd keyloggera668edb9-334e-48eb-8c2e-5413a40867afsh
166credential-accessT1110.001Brute Force: Password Guessing4SUDO brute force Debian464b63e8-bf1f-422e-9e2c-2aa5080b6f9ash
167credential-accessT1110.001Brute Force: Password Guessing5SUDO brute force Redhatb72958a7-53e3-4809-9ee1-58f6ecd99adesh
168credential-accessT1003.007OS Credential Dumping: Proc Filesystem1Dump individual process memory with sh (Local)7e91138a-8e74-456d-a007-973d67a0bb80sh
169credential-accessT1003.007OS Credential Dumping: Proc Filesystem2Dump individual process memory with Python (Local)437b2003-a20d-4ed8-834c-4964f24eec63sh
170credential-accessT1003.007OS Credential Dumping: Proc Filesystem3Capture Passwords with MimiPenguina27418de-bdce-4ebd-b655-38f04842bf0cbash
171credential-accessT1040Network Sniffing1Packet Capture Linux using tshark or tcpdump7fe741f7-b265-4951-a7c7-320889083b3ebash
172credential-accessT1040Network Sniffing9Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo10c710c9-9104-4d5f-8829-5b65391e2a29bash
173credential-accessT1040Network Sniffing10Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo7a0895f0-84c1-4adf-8491-a21510b1d4c1bash
174credential-accessT1040Network Sniffing11Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo515575ab-d213-42b1-aa64-ef6a2dd4641bbash
175credential-accessT1040Network Sniffing12Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudob1cbdf8b-6078-48f5-a890-11ea19d7f8e9bash
176credential-accessT1552Unsecured Credentials1AWS - Retrieve EC2 Password Data using stratusa21118de-b11e-4ebd-b655-42f11142df0csh
177credential-accessT1555.003Credentials from Password Stores: Credentials from Web Browsers9LaZagne.py - Dump Credentials from Firefox Browser87e88698-621b-4c45-8a89-4eaebdeaabb1sh
178credential-accessT1552.004Unsecured Credentials: Private Keys2Discover Private SSH Keys46959285-906d-40fa-9437-5a439accd878sh
179credential-accessT1552.004Unsecured Credentials: Private Keys3Copy Private SSH Keys with CP7c247dc7-5128-4643-907b-73a76d9135c3sh
180credential-accessT1552.004Unsecured Credentials: Private Keys4Copy Private SSH Keys with rsync864bb0b2-6bb5-489a-b43b-a77b3a16d68ash
181credential-accessT1552.004Unsecured Credentials: Private Keys5Copy the users GnuPG directory with rsync2a5a0601-f5fb-4e2e-aa09-73282ae6afcash
182credential-accessT1552.003Unsecured Credentials: Bash History1Search Through Bash History3cfde62b-7c33-4b26-a61e-755d6131c8cesh
183credential-accessT1552.001Unsecured Credentials: Credentials In Files2Extract passwords with grepbd4cf0d1-7646-474e-8610-78ccf5a097c4sh
184credential-accessT1552.001Unsecured Credentials: Credentials In Files5Find and Access Github Credentialsda4f751a-020b-40d7-b9ff-d433b7799803bash
185credential-accessT1110.004Brute Force: Credential Stuffing1SSH Credential Stuffing From Linux4f08197a-2a8a-472d-9589-cd2895ef22adbash
186credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow1Access /etc/shadow (Local)3723ab77-c546-403c-8fb4-bb577033b235bash
187credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow2Access /etc/passwd (Local)60e860b6-8ae6-49db-ad07-5e73edd88f5dsh
188credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow3Access /etc/{shadow,passwd} with a standard bin that's not catdf1a55ae-019d-4120-bc35-94f4bc5c4b0abash
189credential-accessT1003.008OS Credential Dumping: /etc/passwd and /etc/shadow4Access /etc/{shadow,passwd} with shell builtinsf5aa6543-6cb2-4fae-b9c2-b96e14721713bash
190discoveryT1033System Owner/User Discovery2System Owner/User Discovery2a9b677d-a230-44f4-ad86-782df1ef108csh
191discoveryT1087.001Account Discovery: Local Account1Enumerate all accounts (Local)f8aab3dd-5990-4bf8-b8ab-2226c951696fsh
192discoveryT1087.001Account Discovery: Local Account2View sudoers accessfed9be70-0186-4bde-9f8a-20945f9370c2sh
193discoveryT1087.001Account Discovery: Local Account3View accounts with UID 0c955a599-3653-4fe5-b631-f11c00eb0397sh
194discoveryT1087.001Account Discovery: Local Account4List opened files by user7e46c7a5-0142-45be-a858-1a3ecb4fd3cbsh
195discoveryT1087.001Account Discovery: Local Account5Show if a user account has ever logged in remotely0f0b6a29-08c3-44ad-a30b-47fd996b2110sh
196discoveryT1087.001Account Discovery: Local Account6Enumerate users and groupse6f36545-dc1e-47f0-9f48-7f730f54a02esh
197discoveryT1497.001Virtualization/Sandbox Evasion: System Checks1Detect Virtualization Environment (Linux)dfbd1a21-540d-4574-9731-e852bd6fe840sh
198discoveryT1007System Service Discovery3System Service Discovery - systemctlf4b26bce-4c2c-46c0-bcc5-fce062d38befbash
199discoveryT1040Network Sniffing1Packet Capture Linux using tshark or tcpdump7fe741f7-b265-4951-a7c7-320889083b3ebash
200discoveryT1040Network Sniffing9Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo10c710c9-9104-4d5f-8829-5b65391e2a29bash
201discoveryT1040Network Sniffing10Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo7a0895f0-84c1-4adf-8491-a21510b1d4c1bash
202discoveryT1040Network Sniffing11Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo515575ab-d213-42b1-aa64-ef6a2dd4641bbash
203discoveryT1040Network Sniffing12Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudob1cbdf8b-6078-48f5-a890-11ea19d7f8e9bash
204discoveryT1135Network Share Discovery2Network Share Discovery - linux875805bc-9e86-4e87-be86-3a5527315caebash
205discoveryT1082System Information Discovery3List OS Informationcccb070c-df86-4216-a5bc-9fb60c74e27csh
206discoveryT1082System Information Discovery4Linux VM Check via Hardware31dad7ad-2286-4c02-ae92-274418c85fecbash
207discoveryT1082System Information Discovery5Linux VM Check via Kernel Modules8057d484-0fae-49a4-8302-4812c4f1e64ebash
208discoveryT1082System Information Discovery7Hostname Discovery486e88ea-4f56-470f-9b57-3f4d73f39133bash
209discoveryT1082System Information Discovery11Environment variables discovery on macos and linuxfcbdd43f-f4ad-42d5-98f3-0218097e2720sh
210discoveryT1082System Information Discovery24Linux List Kernel Modules034fe21c-3186-49dd-8d5d-128b35f181c7sh
211discoveryT1217Browser Bookmark Discovery1List Mozilla Firefox Bookmark Database Files on Linux3a41f169-a5ab-407f-9269-abafdb5da6c2sh
212discoveryT1016System Network Configuration Discovery3System Network Configuration Discoveryc141bbdb-7fca-4254-9fd6-f47e79447e17sh
213discoveryT1083File and Directory Discovery3Nix File and Directory Discoveryffc8b249-372a-4b74-adcd-e4c0430842desh
214discoveryT1083File and Directory Discovery4Nix File and Directory Discovery 213c5e1ae-605b-46c4-a79f-db28c77ff24esh
215discoveryT1049System Network Connections Discovery3System Network Connections Discovery Linux & MacOS9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2sh
216discoveryT1057Process Discovery1Process Discovery - ps4ff64f0b-aaf2-4866-b39d-38d9791407ccsh
217discoveryT1069.001Permission Groups Discovery: Local Groups1Permission Groups Discovery (Local)952931a4-af0b-4335-bbbe-73c8c5b327aesh
218discoveryT1201Password Policy Discovery1Examine password complexity policy - Ubuntu085fe567-ac84-47c7-ac4c-2688ce28265bbash
219discoveryT1201Password Policy Discovery2Examine password complexity policy - CentOS/RHEL 7.x78a12e65-efff-4617-bc01-88f17d71315dbash
220discoveryT1201Password Policy Discovery3Examine password complexity policy - CentOS/RHEL 6.x6ce12552-0adb-4f56-89ff-95ce268f6358bash
221discoveryT1201Password Policy Discovery4Examine password expiration policy - All Linux7c86c55c-70fa-4a05-83c9-3aa19b145d1abash
222discoveryT1614.001System Location Discovery: System Language Discovery3Discover System Language with locale837d609b-845e-4519-90ce-edc3b4b0e138sh
223discoveryT1614.001System Location Discovery: System Language Discovery4Discover System Language with localectl07ce871a-b3c3-44a3-97fa-a20118fdc7c9sh
224discoveryT1614.001System Location Discovery: System Language Discovery5Discover System Language by locale file5d7057c9-2c8a-4026-91dd-13b5584daa69sh
225discoveryT1614.001System Location Discovery: System Language Discovery6Discover System Language by Environment Variable Querycb8f7cdc-36c4-4ed0-befc-7ad7d24dfd7ash
226discoveryT1518.001Software Discovery: Security Software Discovery4Security Software Discovery - ps (Linux)23b91cd2-c99c-4002-9e41-317c63e024a2sh
227discoveryT1018Remote System Discovery6Remote System Discovery - arp nixacb6b1ff-e2ad-4d64-806c-6c35fe73b951sh
228discoveryT1018Remote System Discovery7Remote System Discovery - sweep96db2632-8417-4dbb-b8bb-a8b92ba391desh
229discoveryT1018Remote System Discovery12Remote System Discovery - ip neighbour158bd4dd-6359-40ab-b13c-285b9ef6fa25sh
230discoveryT1018Remote System Discovery13Remote System Discovery - ip route1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1sh
231discoveryT1018Remote System Discovery14Remote System Discovery - ip tcp_metrics6c2da894-0b57-43cb-87af-46ea3b501388sh
232discoveryT1046Network Service Scanning1Port Scan68e907da-2539-48f6-9fc9-257a78c05540bash
233discoveryT1046Network Service Scanning2Port Scan Nmap515942b0-a09f-4163-a7bb-22fefb6f185fsh
234command-and-controlT1132.001Data Encoding: Standard Encoding1Base64 Encoded data.1164f70f-9a88-4dff-b9ff-dc70e7bf0c25sh
235command-and-controlT1090.003Proxy: Multi-hop Proxy3Tor Proxy Usage - Debian/Ubuntu5ff9d047-6e9c-4357-b39b-5cf89d9b59c7sh
236command-and-controlT1571Non-Standard Port2Testing usage of uncommonly used port5db21e1d-dd9c-4a50-b885-b1e748912767sh
237command-and-controlT1071.001Application Layer Protocol: Web Protocols3Malicious User Agents - Nix2d7c471a-e887-4b78-b0dc-b0df1f2e0658sh
238command-and-controlT1105Ingress Tool Transfer1rsync remote file copy (push)0fc6e977-cb12-44f6-b263-2824ba917409bash
239command-and-controlT1105Ingress Tool Transfer2rsync remote file copy (pull)3180f7d5-52c0-4493-9ea0-e3431a84773fbash
240command-and-controlT1105Ingress Tool Transfer3scp remote file copy (push)83a49600-222b-4866-80a0-37736ad29344bash
241command-and-controlT1105Ingress Tool Transfer4scp remote file copy (pull)b9d22b9a-9778-4426-abf0-568ea64e9c33bash
242command-and-controlT1105Ingress Tool Transfer5sftp remote file copy (push)f564c297-7978-4aa9-b37a-d90477feea4ebash
243command-and-controlT1105Ingress Tool Transfer6sftp remote file copy (pull)0139dba1-f391-405e-a4f5-f3989f2c88efbash
244command-and-controlT1105Ingress Tool Transfer14whois file downloadc99a829f-0bb8-4187-b2c6-d47d1df74cabsh
245command-and-controlT1105Ingress Tool Transfer27Linux Download File and Runbdc373c5-e9cf-4563-8a7b-a9ba720a90f3sh
246command-and-controlT1090.001Proxy: Internal Proxy1Connection Proxy0ac21132-4485-4212-a681-349e8a6637cdsh
247impactT1486Data Encrypted for Impact1Encrypt files using gpg (Linux)7b8ce084-3922-4618-8d22-95f996173765bash
248impactT1486Data Encrypted for Impact2Encrypt files using 7z (Linux)53e6735a-4727-44cc-b35b-237682a151adbash
249impactT1486Data Encrypted for Impact3Encrypt files using ccrypt (Linux)08cbf59f-85da-4369-a5f4-049cffd7709fbash
250impactT1486Data Encrypted for Impact4Encrypt files using openssl (Linux)142752dc-ca71-443b-9359-cf6f497315f1bash
251impactT1496Resource Hijacking1macOS/Linux - Simulate CPU Load with Yes904a5a0e-fb02-490d-9f8d-0e256eb37549bash
252impactT1485Data Destruction2macOS/Linux - Overwrite file with DD38deee99-fd65-4031-bec8-bfa4f9f26146bash
253impactT1529System Shutdown/Reboot3Restart System via `shutdown` - macOS/Linux6326dbc4-444b-4c04-88f4-27e94d0327cbbash
254impactT1529System Shutdown/Reboot4Shutdown System via `shutdown` - macOS/Linux4963a81e-a3ad-4f02-adda-812343b351debash
255impactT1529System Shutdown/Reboot5Restart System via `reboot` - macOS/Linux47d0b042-a918-40ab-8cf9-150ffe919027bash
256impactT1529System Shutdown/Reboot6Shutdown System via `halt` - Linux918f70ab-e1ef-49ff-bc57-b27021df84ddbash
257impactT1529System Shutdown/Reboot7Reboot System via `halt` - Linux78f92e14-f1e9-4446-b3e9-f1b921f2459ebash
258impactT1529System Shutdown/Reboot8Shutdown System via `poweroff` - Linux73a90cd2-48a2-4ac5-8594-2af35fa909fabash
259impactT1529System Shutdown/Reboot9Reboot System via `poweroff` - Linux61303105-ff60-427b-999e-efb90b314e41bash
260executionT1053.003Scheduled Task/Job: Cron1Cron - Replace crontab with referenced file435057fb-74b1-410e-9403-d81baf194f75bash
261executionT1053.003Scheduled Task/Job: Cron2Cron - Add script to all cron subfoldersb7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0bash
262executionT1053.003Scheduled Task/Job: Cron3Cron - Add script to /var/spool/cron/crontabs/ folder2d943c18-e74a-44bf-936f-25ade6cccab4bash
263executionT1053.006Scheduled Task/Job: Systemd Timers1Create Systemd Service and Timerf4983098-bb13-44fb-9b2c-46149961807bbash
264executionT1053.006Scheduled Task/Job: Systemd Timers2Create a user level transient systemd service and timer3de33f5b-62e5-4e63-a2a0-6fd8808c80ecsh
265executionT1053.006Scheduled Task/Job: Systemd Timers3Create a system level transient systemd service and timerd3eda496-1fc0-49e9-aff5-3bec5da9fa22sh
266executionT1059.004Command and Scripting Interpreter: Bash1Create and Execute Bash Shell Script7e7ac3ed-f795-4fa5-b711-09d6fbe9b873sh
267executionT1059.004Command and Scripting Interpreter: Bash2Command-Line Interfaced0c88567-803d-4dca-99b4-7ce65e7b257csh
268executionT1059.004Command and Scripting Interpreter: Bash3Harvest SUID executable files46274fc6-08a7-4956-861b-24cbbaa0503csh
269executionT1059.004Command and Scripting Interpreter: Bash4LinEnum tool executiona2b35a63-9df1-4806-9a4d-5fe0500845f2sh
270executionT1059.004Command and Scripting Interpreter: Bash5New script file in the tmp directory8cd1947b-4a54-41fb-b5ea-07d0ace04f81sh
271executionT1059.004Command and Scripting Interpreter: Bash6What shell is running7b38e5cc-47be-44f0-a425-390305c76c17sh
272executionT1059.004Command and Scripting Interpreter: Bash7What shells are availablebf23c7dc-1004-4949-8262-4c1d1ef87702sh
273executionT1059.004Command and Scripting Interpreter: Bash8Command line scriptsb04ed73c-7d43-4dc8-b563-a2fc595cba1ash
274executionT1059.004Command and Scripting Interpreter: Bash9Obfuscated command line scripts5bec4cc8-f41e-437b-b417-33ff60acf9afsh
275executionT1059.006Command and Scripting Interpreter: Python1Execute shell script via python's command mode arguement3a95cdb2-c6ea-4761-b24e-02b71889b8bbsh
276executionT1059.006Command and Scripting Interpreter: Python2Execute Python via scripts (Linux)6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8sh
277executionT1059.006Command and Scripting Interpreter: Python3Execute Python via Python executables (Linux)0b44d79b-570a-4b27-a31f-3bf2156e5eaash
278executionT1059.006Command and Scripting Interpreter: Python4Python pty module and spawn function used to spawn sh or bash161d694c-b543-4434-85c3-c3a433e33792bash
279executionT1053.002Scheduled Task/Job: At2At - Schedule a job7266d898-ac82-4ec0-97c7-436075d0d08esh
280exfiltrationT1048.002Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol2Exfiltrate data HTTPS using curl linux4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01bash
281exfiltrationT1048Exfiltration Over Alternative Protocol1Exfiltration Over Alternative Protocol - SSHf6786cc8-beda-4915-a4d6-ac2f193bb988sh
282exfiltrationT1048Exfiltration Over Alternative Protocol2Exfiltration Over Alternative Protocol - SSH7c3cb337-35ae-4d06-bf03-3032ed2ec268sh
283exfiltrationT1030Data Transfer Size Limits1Data Transfer Size Limitsab936c51-10f4-46ce-9144-e02137b2016ash
284exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol1Exfiltration Over Alternative Protocol - HTTP1d1abbd6-a3d3-4b2e-bef5-c59293f46effmanual
285exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol3Exfiltration Over Alternative Protocol - DNSc403b5a4-b5fc-49f2-b181-d1c80d27db45manual
286exfiltrationT1048.003Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol8Python3 http.server3ea1f938-f80a-4305-9aa8-431bc4867313sh