SigmaHQ/rules/windows/powershell
Thomas Patzke 8d6a507ec4 OSCD QA wave 1
* Checked all rules against Mordor and EVTX samples datasets
* Added field names
* Some severity adjustments
* Fixes
2020-01-11 00:11:27 +01:00
..
powershell_alternate_powershell_hosts.yml OSCD QA wave 1 2020-01-11 00:11:27 +01:00
powershell_clear_powershell_history.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_data_compressed.yml Data Compressed duplciate titles 2019-12-09 16:24:10 +00:00
powershell_dnscat_execution.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_downgrade_attack.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_exe_calling_ps.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_invoke_obfuscation_obfuscated_iex.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_malicious_commandlets.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_malicious_keywords.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_ntfs_ads_access.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_prompt_credentials.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_psattack.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_remote_powershell_session.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_shellcode_b64.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_download.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_invocation_generic.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_invocation_specific.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_keywords.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_winlogon_helper_dll.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00