auto_sigma_rule_generator/backend/templates/powershell_execution.yaml

32 lines
No EOL
791 B
YAML

template_name: "PowerShell Execution Detection"
description: "Detects suspicious PowerShell execution based on PoC exploit indicators"
applicable_product_patterns:
- "powershell"
- "windows"
- "microsoft"
template_content: |
title: {{TITLE}}
id: {{RULE_ID}}
status: experimental
description: {{DESCRIPTION}}
author: CVE-SIGMA Auto Generator
date: {{DATE}}
references:
{{REFERENCES}}
tags:
{{TAGS}}
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\\powershell.exe'
- '\\pwsh.exe'
CommandLine|contains:
{{COMMANDS}}
condition: selection
falsepositives:
- Legitimate PowerShell scripts
- System administration
level: {{LEVEL}}