Files
hayabusa/rules/deep_blue_cli/powershell/4103.yml
2021-09-13 23:26:15 +09:00

20 lines
463 B
YAML

title: PowerShell Execution Pipeline
description: hogehoge
author: Yea
logsource:
product: windows
detection:
selection:
Channel: Microsoft-Windows-PowerShell/Operational
EventID: 4103
ContextInfo:
- Host Application
- ホスト アプリケーション
# condition: selection
falsepositives:
- unknown
level: medium
output: 'command=%CommandLine%'
creation_date: 2020/11/8
updated_date: 2020/11/8