From b4cb953aa4fcb8cef14c9ddda4726b24937683d6 Mon Sep 17 00:00:00 2001 From: Samirbous <64742097+Samirbous@users.noreply.github.com> Date: Tue, 26 Jan 2021 09:07:39 +0100 Subject: [PATCH] [New Rule] Script Execution via Automator Workflows (#763) * [New Rule] Script Execution via Automator Workflows * Update execution_script_via_automator_workflows.toml * Update rules/macos/execution_script_via_automator_workflows.toml Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com> * Update rules/macos/execution_script_via_automator_workflows.toml Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com> Co-authored-by: David French <56409778+threat-punter@users.noreply.github.com> --- ...cution_script_via_automator_workflows.toml | 42 +++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 rules/macos/execution_script_via_automator_workflows.toml diff --git a/rules/macos/execution_script_via_automator_workflows.toml b/rules/macos/execution_script_via_automator_workflows.toml new file mode 100644 index 000000000..d81c79851 --- /dev/null +++ b/rules/macos/execution_script_via_automator_workflows.toml @@ -0,0 +1,42 @@ +[metadata] +creation_date = "2020/12/23" +maturity = "production" +updated_date = "2020/12/23" + +[rule] +author = ["Elastic"] +description = """ +Identifies the execution of the Automator Workflows process followed by a network connection from it's XPC service. Adversaries may drop a custom workflow template that hosts +malicious JavaScript for Automation (JXA) code as an alternative to using osascript. +""" +from = "now-9m" +index = ["auditbeat-*", "logs-endpoint.events.*"] +language = "eql" +license = "Elastic License" +name = "Suspicious Automator Workflows Execution" +references = ["https://posts.specterops.io/persistent-jxa-66e1c3cd1cf5"] +risk_score = 47 +rule_id = "5d9f8cfc-0d03-443e-a167-2b0597ce0965" +severity = "medium" +tags = ["Elastic", "Host", "macOS", "Threat Detection", "Execution"] +type = "eql" + +query = ''' +sequence by host.id with maxspan=30s + [process where event.type in ("start", "process_started") and process.name == "automator"] + [network where process.name:"com.apple.automator.runner"] +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1059" +name = "Command and Scripting Interpreter" +reference = "https://attack.mitre.org/techniques/T1059/" + + +[rule.threat.tactic] +id = "TA0002" +name = "Execution" +reference = "https://attack.mitre.org/tactics/TA0002/"