← Back to SOC feed Coverage →

System Information Discovery

sigma LOW SigmaHQ
T1082
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: high

Hunt Hypothesis

Adversaries may use system information discovery commands to gather details about the target environment, which can help them tailor further attacks. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential reconnaissance activities early and prevent escalation to more severe compromises.

Detection Rule

Sigma (Original)

title: System Information Discovery
id: 42df45e7-e6e9-43b5-8f26-bec5b39cc239
status: stable
description: Detects system information discovery commands
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md
author: Ömer Günal, oscd.community
date: 2020-10-08
modified: 2021-09-14
tags:
    - attack.discovery
    - attack.t1082
logsource:
    product: linux
    category: process_creation
detection:
    selection:
        Image|endswith:
            - '/uname'
            - '/hostname'
            - '/uptime'
            - '/lspci'
            - '/dmidecode'
            - '/lscpu'
            - '/lsmod'
    condition: selection
falsepositives:
    - Legitimate administration activities
level: informational

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/uname" or TargetProcessName endswith "/hostname" or TargetProcessName endswith "/uptime" or TargetProcessName endswith "/lspci" or TargetProcessName endswith "/dmidecode" or TargetProcessName endswith "/lscpu" or TargetProcessName endswith "/lsmod"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_system_info_discovery.yml