Skip to content

Latest commit

 

History

History
34 lines (27 loc) · 1.32 KB

MATCH-S00191.md

File metadata and controls

34 lines (27 loc) · 1.32 KB

Rules: Suspicious PowerShell Keywords

Description

Detects keywords that could indicate the use of a PowerShell exploitation framework.

Additional Details

Detail Value
Type Templated Match
Category Execution
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Suspicious PowerShell Keywords
Summary Expression Powershell exploitation framework keywords detected on host: {{device_hostname}}
Score/Severity Static: 1
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.005, _mitreAttackTechnique:T1059, _mitreAttackTechnique:T1059.003, _mitreAttackTechnique:T1059.001, _mitreAttackTechnique:T1134, _mitreAttackTechnique:T1134.001, _mitreAttackTechnique:T1134.002, _mitreAttackTechnique:T1134.003

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username