Process Discovery

Detects process discovery commands. Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

Sigma rule (View on GitHub)

 1title: Process Discovery
 2id: 4e2f5868-08d4-413d-899f-dc2f1508627b
 3status: stable
 4description: |
 5  Detects process discovery commands. Adversaries may attempt to get information about running processes on a system.
 6  Information obtained could be used to gain an understanding of common software/applications running on systems within the network  
 7references:
 8    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1057/T1057.md
 9author: Ömer Günal, oscd.community
10date: 2020-10-06
11modified: 2022-07-07
12tags:
13    - attack.discovery
14    - attack.t1057
15logsource:
16    product: linux
17    category: process_creation
18detection:
19    selection:
20        Image|endswith:
21            - '/ps'
22            - '/top'
23    condition: selection
24falsepositives:
25    - Legitimate administration activities
26level: informational

References

Related rules

to-top