Files
hayabusa/rules/PowershellOperational/4103_T1059_PowershellExecutionPipeline.yml
Tanaka Zakku f29b7d2d1a Updated rules
2021-11-06 09:51:38 +09:00

23 lines
644 B
YAML

title: PowerShell Execution Pipeline
title_jp: PowerShell実行
description: Displays powershell execution
description_jp: Powershellの実行を出力する。
author: Eric Conrad
contributor: Zach Mathis
mitre_attack: T1059
level: medium
detection:
selection:
Channel: Microsoft-Windows-PowerShell/Operational
EventID: 4103
ContextInfo:
- Host Application
- ホスト アプリケーション
# condition: selection
falsepositives:
- normal system usage
output: 'Command = %CommandLine%'
output_jp: 'コマンド = %CommandLine%'
creation_date: 2020/11/08
updated_date: 2021/11/06