Atomic Red Team
Description
Invoke-atomictest T1059.001 of all Atomic Red Team T1059.001 PowerShell tests.
MITRE ATT&CK Techniques
| ID | Technique | Tactic |
|---|---|---|
| T1059.001 | PowerShell | Execution |
Environment Details
| Field | Value |
|---|---|
| Environment | attack_range |
| Directory | atomic_red_team |
| Test Date | 2021-03-01 |
Datasets
The following datasets were collected during this attack simulation:
Captcha_windows-Sysmon
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/captcha_windows-sysmon.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Get_ciminstance_windows-Powershell
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/get_ciminstance_windows-powershell.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
Start_stop_service_windows-Powershell
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/start_stop_service_windows-powershell.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
Windows-Security-2
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/windows-security-2.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Security
4104-Psremoting-Windows-Powershell
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/4104-psremoting-windows-powershell.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
Win32_scheduledjob_windows-Powershell
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/win32_scheduledjob_windows-powershell.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
Enableat_windows-Sysmon
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/enableat_windows-sysmon.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows-Sysmon
- Path:
/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log - Sourcetype:
XmlWinEventLog - Source:
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Related Detections
The following detections in our security content repository use this attack data for testing:
| Detection Name | Type | Source | MITRE ATT&CK | Analytic Story |
|---|---|---|---|---|
| Windows PowerShell WMI Win32 ScheduledJob | TTP |
Endpoint | T1059.001 | Active Directory Lateral Movement |
| Windows PowerShell FakeCAPTCHA Clipboard Execution | TTP |
Endpoint | T1059.001, T1204.001, T1059.003 | Scattered Lapsus$ Hunters, Fake CAPTCHA Campaigns, Cisco Network Visibility Module Analytics, Interlock Ransomware |
| PowerShell Enable PowerShell Remoting | Anomaly |
Endpoint | T1059.001 | Malicious PowerShell |
| Windows Enable Win32 ScheduledJob via Registry | Anomaly |
Endpoint | T1053.005 | Active Directory Lateral Movement, Scheduled Tasks |
| Windows PowerShell Invoke-RestMethod IP Information Collection | Anomaly |
Endpoint | T1082, T1016, T1059.001 | Water Gamayun |
| Windows PowerShell Get CIMInstance Remote Computer | Anomaly |
Endpoint | T1059.001 | Active Directory Lateral Movement |
| Windows File Download Via PowerShell | Anomaly |
Endpoint | T1059.001, T1105 | Microsoft WSUS CVE-2025-59287, APT37 Rustonotto and FadeStealer, GhostRedirector IIS Module and Rungan Backdoor, Winter Vivern, Phemedrone Stealer, Malicious PowerShell, Data Destruction, SysAid On-Prem Software CVE-2023-47246 Vulnerability, PHP-CGI RCE Attack on Japanese Organizations, Hermetic Wiper, IcedID, Ingress Tool Transfer, HAFNIUM Group, XWorm, Cisco Network Visibility Module Analytics |
| Nishang PowershellTCPOneLine | TTP |
Endpoint | T1059.001 | HAFNIUM Group, Cleo File Transfer Software |
| PowerShell Start or Stop Service | Anomaly |
Endpoint | T1059.001 | Scattered Lapsus$ Hunters, Active Directory Lateral Movement |
Usage Instructions
Replay with Splunk Attack Data
Replay attack data with replay.py from Splunk Attack Data.
1python replay.py --dataset /datasets/attack_techniques/T1059.001/atomic_red_team/captcha_windows-sysmon.log --index attack_data
Manual Import
- Download the dataset files from the paths listed above
- Configure your Splunk instance with the appropriate sourcetypes
- Import the logs using the Splunk Add Data wizard
Related Content
Find more detections and analytics for this attack technique in our security content repository.
Source: GitHub | Version: 1.0