Skip to content

DET0483 Detection of System Service Discovery Commands Across OS Platforms

Item Value
ID DET0483
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1007 (System Service Discovery)

Analytics

Windows

AN1325

Enumeration of services via native CLI tools (e.g., sc query, tasklist /svc, net start) or API calls via PowerShell and WMI.

Log Sources
Data Component Name Channel
Process Creation (DC0032) WinEventLog:Security EventCode=4688
Command Execution (DC0064) WinEventLog:PowerShell EventCode=4103, 4104, 4105, 4106
Mutable Elements
Field Description
ProcessName Can be tuned to specific binaries used for service enumeration (e.g., sc.exe, tasklist.exe).
CommandLineMatch Filters for variations like sc query, net start, Get-Service.
ParentProcess Used to suppress known admin scripts or automation jobs.

Linux

AN1326

Execution of service management commands like systemctl list-units, service --status-all, or direct reading of /etc/init.d.

Log Sources
Data Component Name Channel
Process Creation (DC0032) auditd:EXECVE execve
Mutable Elements
Field Description
CommandPattern Includes service enumeration commands like systemctl, service, or custom scripts.
ExecutionUser Tunable by user context (e.g., root vs. standard user).
TimeWindow Used for correlation with privilege escalation or lateral movement.

macOS

AN1327

Discovery via launchctl commands, or process enumeration using ps aux | grep com.apple. to identify daemons and services.

Log Sources
Data Component Name Channel
Command Execution (DC0064) macos:unifiedlog None
Process Creation (DC0032) macos:osquery process_events
Mutable Elements
Field Description
CommandLineContent Tune to recognize launchctl list, launchctl print, or service grep strings.
ProcessParent Filter known benign automation or MDM agent invocations.