Techniques
Sample rules
Process Discovery via Tasklist
- source: elastic
- technicques:
- T1057
Description
Adversaries may attempt to get information about running processes on a system.
Detection logic
event.category:process and event.type:(start or process_started) and process.name:tasklist.exe