template_name: "PowerShell Execution Detection" description: "Detects suspicious PowerShell execution based on PoC exploit indicators" applicable_product_patterns: - "powershell" - "windows" - "microsoft" template_content: | title: {{TITLE}} id: {{RULE_ID}} status: experimental description: {{DESCRIPTION}} author: CVE-SIGMA Auto Generator date: {{DATE}} references: {{REFERENCES}} tags: {{TAGS}} logsource: category: process_creation product: windows detection: selection: Image|endswith: - '\\powershell.exe' - '\\pwsh.exe' CommandLine|contains: {{COMMANDS}} condition: selection falsepositives: - Legitimate PowerShell scripts - System administration level: {{LEVEL}}