Files
hayabusa/rules/powershell/downgrade_attack.yml
2021-09-13 23:26:15 +09:00

17 lines
399 B
YAML

title: PowerShell DownGradeAttack
description: hogehoge
author: Yea
logsource:
product: windows
detection:
selection:
Channel: Windows PowerShell
EventID: 400
EventData|re: '[\s\S]*EngineVersion=2\.0[\s\S]*'
falsepositives:
- unknown
level: medium
output: 'Powershell DownGrade Attack Detected!!'
creation_date: 2020/11/8
updated_date: 2020/11/8