Skip to content

Latest commit

 

History

History
32 lines (25 loc) · 1.32 KB

MATCH-S00190.md

File metadata and controls

32 lines (25 loc) · 1.32 KB

Rules: Malicious PowerShell Invoke Commands

Description

Detects Commandlet names from well-known PowerShell exploitation frameworks.

Additional Details

Detail Value
Type Templated Match
Category Execution
Apply Risk to Entities user_username, device_hostname, device_ip
Signal Name Malicious PowerShell Invoke Commands
Summary Expression Powershell executed exploitation commandlet on host: {{device_hostname}}
Score/Severity Static: 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.001, _mitreAttackTechnique:T1003.002, _mitreAttackTechnique:T1003.003, _mitreAttackTechnique:T1003.004, _mitreAttackTechnique:T1003.005, _mitreAttackTechnique:T1003.006, _mitreAttackTechnique:T1059, _mitreAttackTechnique:T1059.003, _mitreAttackTechnique:T1059.001, _mitreAttackTechnique:T1134, _mitreAttackTechnique:T1134.001, _mitreAttackTechnique:T1134.002, _mitreAttackTechnique:T1134.003

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username