Files
hayabusa/rules/powershell/downgrade_attack.yml
James c13e6da932 Feature/sigmarule wildcard regex caseinsensitive#119 (#123)
* under constructing

* underconstructing

* fix rule file for SIGMA rule.

* wildcard case insensetive.

* refactor

* Update src/detections/rule.rs

add test triple backshash

Co-authored-by: itiB <is0312vx@ed.ritsumei.ac.jp>

* remove unnecessary if statement

Co-authored-by: itiB <is0312vx@ed.ritsumei.ac.jp>
2021-07-02 20:19:53 +09:00

18 lines
414 B
YAML

title: PowerShell DownGradeAttack
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows
detection:
selection:
Channel: Windows PowerShell
EventID: 400
EventData|re: '[\s\S]*EngineVersion=2\.0[\s\S]*'
falsepositives:
- unknown
level: medium
output: 'Powershell DownGrade Attack Detected!!'
creation_date: 2020/11/8
updated_date: 2020/11/8