title: T1086 PowerShell Execution description: Detects execution of PowerShell status: experimental date: 2019/09/12 modified: 2019/11/10 author: Roberto Rodriguez @Cyb3rWard0g references: - https://github.com/Cyb3rWard0g/ThreatHunter-Playbook/tree/master/playbooks/windows/02_execution/T1086_powershell/basic_powershell_execution.md logsource: product: windows service: sysmon detection: selection: EventID: 17 PipeName|startswith: '\PSHost' condition: selection falsepositives: - Unknown level: critical