SigmaHQ/rules/linux/lnx_process_discovery.yml
2021-08-14 09:54:27 +02:00

25 lines
605 B
YAML

title: Process Discovery
id: 4e2f5868-08d4-413d-899f-dc2f1508627b
status: stable
description: Detects process discovery commands
author: Ömer Günal, oscd.community
date: 2020/10/06
modified: 2021/08/14
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1057/T1057.md
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/ps'
- '/top'
condition: selection
falsepositives:
- Legitimate administration activities
level: informational
tags:
- attack.discovery
- attack.t1057