49 lines
1.4 KiB
YAML
49 lines
1.4 KiB
YAML
|
|
title: XSL Script Processing
|
|
ruletype: Sigma
|
|
author: Timur Zinniatullin, oscd.community
|
|
date: 2019/10/21
|
|
description: Extensible Stylesheet Language (XSL) files are commonly used to describe
|
|
the processing and rendering of data within XML files. Rule detects when adversaries
|
|
abuse this functionality to execute arbitrary files while potentially bypassing
|
|
application whitelisting defenses.
|
|
detection:
|
|
SELECTION_1:
|
|
EventID: 1
|
|
SELECTION_2:
|
|
Image: '*\wmic.exe'
|
|
SELECTION_3:
|
|
CommandLine: '*/format*'
|
|
SELECTION_4:
|
|
Image: '*\msxsl.exe'
|
|
SELECTION_5:
|
|
CommandLine:
|
|
- '*/Format:List*'
|
|
- '*/Format:htable*'
|
|
- '*/Format:hform*'
|
|
- '*/Format:table*'
|
|
- '*/Format:mof*'
|
|
- '*/Format:value*'
|
|
- '*/Format:rawxml*'
|
|
- '*/Format:xml*'
|
|
- '*/Format:csv*'
|
|
condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3) or SELECTION_4) and not
|
|
(SELECTION_5))
|
|
falsepositives:
|
|
- WMIC.exe FP depend on scripts and administrative methods used in the monitored environment.
|
|
- msxsl.exe is not installed by default, so unlikely.
|
|
- Static format arguments - https://petri.com/command-line-wmi-part-3
|
|
id: 05c36dd6-79d6-4a9a-97da-3db20298ab2d
|
|
level: medium
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
modified: 2021/11/29
|
|
references:
|
|
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1220/T1220.md
|
|
status: test
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1220
|
|
- attack.execution
|