template_name: "Process Execution Detection" description: "Detects suspicious process execution based on PoC exploit indicators" applicable_product_patterns: - "windows" - "microsoft" - "office" - "exchange" - "sharepoint" template_content: | title: {{TITLE}} id: {{RULE_ID}} status: experimental description: {{DESCRIPTION}} author: CVE-SIGMA Auto Generator date: {{DATE}} references: {{REFERENCES}} tags: {{TAGS}} logsource: category: process_creation product: windows detection: selection: Image|endswith: {{PROCESSES}} selection_cmd: CommandLine|contains: {{COMMANDS}} condition: selection or selection_cmd falsepositives: - Legitimate software installations - System administration tasks level: {{LEVEL}}