* under constructing * underconstructing * fix rule file for SIGMA rule. * wildcard case insensetive. * refactor * Update src/detections/rule.rs add test triple backshash Co-authored-by: itiB <is0312vx@ed.ritsumei.ac.jp> * remove unnecessary if statement Co-authored-by: itiB <is0312vx@ed.ritsumei.ac.jp>
18 lines
414 B
YAML
18 lines
414 B
YAML
title: PowerShell DownGradeAttack
|
|
description: hogehoge
|
|
enabled: true
|
|
author: Yea
|
|
logsource:
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
Channel: Windows PowerShell
|
|
EventID: 400
|
|
EventData|re: '[\s\S]*EngineVersion=2\.0[\s\S]*'
|
|
falsepositives:
|
|
- unknown
|
|
level: medium
|
|
output: 'Powershell DownGrade Attack Detected!!'
|
|
creation_date: 2020/11/8
|
|
updated_date: 2020/11/8
|