Files
blue-team-tools/rules/linux/lnx_process_discovery.yml
T

25 lines
605 B
YAML
Raw Normal View History

2020-10-06 23:52:06 +03:00
title: Process Discovery
id: 4e2f5868-08d4-413d-899f-dc2f1508627b
status: stable
description: Detects process discovery commands
2020-10-07 22:26:02 +03:00
author: Ömer Günal, oscd.community
2020-10-06 23:52:06 +03:00
date: 2020/10/06
2021-08-14 09:54:27 +02:00
modified: 2021/08/14
2020-10-06 23:52:06 +03:00
references:
2020-10-16 10:58:51 +03:00
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1057/T1057.md
2020-10-06 23:52:06 +03:00
logsource:
product: linux
2020-11-18 23:25:15 +03:00
category: process_creation
2020-10-06 23:52:06 +03:00
detection:
2020-10-16 10:52:54 +03:00
selection:
2021-08-14 09:54:27 +02:00
Image|endswith:
2020-11-18 23:25:15 +03:00
- '/ps'
- '/top'
2020-10-16 10:52:54 +03:00
condition: selection
2020-10-06 23:52:06 +03:00
falsepositives:
- Legitimate administration activities
2021-04-03 00:00:43 +02:00
level: informational
2020-10-06 23:52:06 +03:00
tags:
- attack.discovery
2020-10-07 22:26:02 +03:00
- attack.t1057