Process Discovery

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Adversaries may use the information from Process Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

Source:
https://attack.mitre.org/techniques/T1057/

Back to Playbook Battle Cards
See Playbook Battle Cards on GitHub