Skip to content

This Splunk dashboard detects PowerShell EncodedCommand use (T1059.001) by flagging base64 blobs over 500 bytes, with 1-second timeline, host stats, and event counts, based on index=main data and installable as a JSON file or app on Splunk Cloud or 9.x.

License

Notifications You must be signed in to change notification settings

dmtkfs/t1059-powershell-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

T1059.001 • PowerShell EncodedCommand Detection (Splunk Dashboard)

Splunk dashboard that detects PowerShell EncodedCommand usage (MITRE ATT&CK T1059.001) by flagging Base64 blobs over 500 bytes.

Dashboard Saved Search Splunk version
T1059_001_PowerShell_Demo.dashboard.json T1059 EncodedCommand Advanced Cloud / 9.x

T1059.001 dashboard showing total hits, host statistics, and timeline

T1059.001 dashboard showing total hits, host statistics, and timeline

What you get

  • Single-value: total EncodedCommand events (click to open raw search)
  • Host stats table: count, distinct blobs, blob size metrics, first/last seen
  • Timeline: 1-second resolution hit count

All panels honour the global time-range picker.

Quick-start

# drop into a Splunk box
$SPLUNK_HOME/etc/apps/
└── T1059_PowerShell_Demo/

or install as an app-package:

splunk install app T1059_PowerShell_Demo.spl

Data assumptions

Events live in index=main and contain either -EncodedCommand or $EncodedCommand = "<base64>".

Credits

About

This Splunk dashboard detects PowerShell EncodedCommand use (T1059.001) by flagging base64 blobs over 500 bytes, with 1-second timeline, host stats, and event counts, based on index=main data and installable as a JSON file or app on Splunk Cloud or 9.x.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published