← Back to SOC feed Coverage →

Potential Discovery Activity Using Find - Linux

sigma MEDIUM SigmaHQ
T1083
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may be using the find command on Linux systems to discover and locate sensitive files or directories, indicating potential reconnaissance or persistence activity. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify early-stage compromise and prevent further lateral movement or data exfiltration.

Detection Rule

Sigma (Original)

title: Potential Discovery Activity Using Find - Linux
id: 8344c0e5-5783-47cc-9cf9-a0f7fd03e6cf
related:
    - id: 85de3a19-b675-4a51-bfc6-b11a5186c971
      type: similar
status: test
description: Detects usage of "find" binary in a suspicious manner to perform discovery
references:
    - https://github.com/SaiSathvik1/Linux-Privilege-Escalation-Notes
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-28
tags:
    - attack.discovery
    - attack.t1083
logsource:
    category: process_creation
    product: linux
detection:
    selection:
        Image|endswith: '/find'
        CommandLine|contains:
            - '-perm -4000'
            - '-perm -2000'
            - '-perm 0777'
            - '-perm -222'
            - '-perm -o w'
            - '-perm -o x'
            - '-perm -u=s'
            - '-perm -g=s'
    condition: selection
falsepositives:
    - Unknown
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/find" and (TargetProcessCommandLine contains "-perm -4000" or TargetProcessCommandLine contains "-perm -2000" or TargetProcessCommandLine contains "-perm 0777" or TargetProcessCommandLine contains "-perm -222" or TargetProcessCommandLine contains "-perm -o w" or TargetProcessCommandLine contains "-perm -o x" or TargetProcessCommandLine contains "-perm -u=s" or TargetProcessCommandLine contains "-perm -g=s")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_susp_find_execution.yml