Process Discovery (4e2f5868-08d4-413d-899f-dc2f1508627b)
Detects process discovery commands. Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Process Discovery - T1057 (8f4a33ec-8b1f-4b80-a2f6-642b2e479580) | Attack Pattern | Process Discovery (4e2f5868-08d4-413d-899f-dc2f1508627b) | Sigma-Rules | 1 |