← Back to SOC feed Coverage →

Security Software Discovery - Linux

sigma LOW SigmaHQ
T1518.001
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may use grep or egrep to identify and target security software on Linux systems, indicating potential reconnaissance activity. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect early signs of adversarial reconnaissance and mitigate potential compromises.

Detection Rule

Sigma (Original)

title: Security Software Discovery - Linux
id: c9d8b7fd-78e4-44fe-88f6-599135d46d60
status: test
description: Detects usage of system utilities (only grep and egrep for now) to discover security software discovery
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1518.001/T1518.001.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2022-11-27
tags:
    - attack.discovery
    - attack.t1518.001
logsource:
    category: process_creation
    product: linux
detection:
    selection:
        Image|endswith:
            # You can add more grep variations such as fgrep, rgrep...etc
            - '/grep'
            - '/egrep'
        CommandLine|contains:
            - 'nessusd'        # nessus vulnerability scanner
            - 'td-agent'       # fluentd log shipper
            - 'packetbeat'     # elastic network logger/shipper
            - 'filebeat'       # elastic log file shipper
            - 'auditbeat'      # elastic auditing agent/log shipper
            - 'osqueryd'       # facebook osquery
            - 'cbagentd'       # carbon black
            - 'falcond'        # crowdstrike falcon
    condition: selection
falsepositives:
    - Legitimate activities
level: low

KQL (Azure Sentinel)

imProcessCreate
| where (TargetProcessName endswith "/grep" or TargetProcessName endswith "/egrep") and (TargetProcessCommandLine contains "nessusd" or TargetProcessCommandLine contains "td-agent" or TargetProcessCommandLine contains "packetbeat" or TargetProcessCommandLine contains "filebeat" or TargetProcessCommandLine contains "auditbeat" or TargetProcessCommandLine contains "osqueryd" or TargetProcessCommandLine contains "cbagentd" or TargetProcessCommandLine contains "falcond")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_security_software_discovery.yml