Skip to content

Commit 0190b77

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 4 (#4225)
(cherry picked from commit 63956a6)
1 parent ffd4410 commit 0190b77

10 files changed

+70
-45
lines changed

rules/windows/execution_windows_powershell_susp_args.toml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2024/09/06"
3-
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/10/31"
88

99
[rule]
1010
author = ["Elastic"]
@@ -19,7 +19,8 @@ index = [
1919
"logs-system.security*",
2020
"logs-windows.sysmon_operational-*",
2121
"logs-sentinel_one_cloud_funnel.*",
22-
"logs-m365_defender.event-*"
22+
"logs-m365_defender.event-*",
23+
"logs-crowdstrike.fdr*"
2324
]
2425
language = "eql"
2526
license = "Elastic License v2"
@@ -35,7 +36,8 @@ tags = [
3536
"Data Source: System",
3637
"Data Source: Sysmon",
3738
"Data Source: SentinelOne",
38-
"Data Source: Microsoft Defender for Endpoint"
39+
"Data Source: Microsoft Defender for Endpoint",
40+
"Data Source: Crowdstrike"
3941
]
4042
timestamp_override = "event.ingested"
4143
type = "eql"

rules/windows/impact_volume_shadow_copy_deletion_via_powershell.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/07/19"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -103,6 +104,7 @@ tags = [
103104
"Data Source: Microsoft Defender for Endpoint",
104105
"Data Source: Sysmon",
105106
"Data Source: SentinelOne",
107+
"Data Source: Crowdstrike",
106108
]
107109
timestamp_override = "event.ingested"
108110
type = "eql"

rules/windows/initial_access_execution_from_inetcache.toml

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2024/02/14"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -44,15 +45,21 @@ tags = [
4445
"Data Source: Microsoft Defender for Endpoint",
4546
"Data Source: Sysmon",
4647
"Data Source: SentinelOne",
48+
"Data Source: Crowdstrike",
4749
]
4850
timestamp_override = "event.ingested"
4951
type = "eql"
5052

5153
query = '''
5254
process where host.os.type == "windows" and event.type == "start" and
53-
process.parent.name : ("explorer.exe", "winrar.exe", "7zFM.exe", "Bandizip.exe") and
54-
(process.args : "?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*" or
55-
process.executable : "?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*")
55+
process.parent.name : ("explorer.exe", "winrar.exe", "7zFM.exe", "Bandizip.exe") and
56+
(
57+
process.args : "?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*" or
58+
process.executable : (
59+
"?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*",
60+
"\\Device\\HarddiskVolume?\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*"
61+
)
62+
)
5663
'''
5764

5865

rules/windows/initial_access_suspicious_ms_exchange_process.toml

Lines changed: 24 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/03/04"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -28,6 +28,7 @@ index = [
2828
"logs-system.security*",
2929
"logs-m365_defender.event-*",
3030
"logs-sentinel_one_cloud_funnel.*",
31+
"logs-crowdstrike.fdr*",
3132
]
3233
language = "eql"
3334
license = "Elastic License v2"
@@ -52,23 +53,34 @@ tags = [
5253
"Data Source: Microsoft Defender for Endpoint",
5354
"Data Source: Sysmon",
5455
"Data Source: SentinelOne",
56+
"Data Source: Crowdstrike",
5557
]
5658
timestamp_override = "event.ingested"
5759
type = "eql"
5860

5961
query = '''
6062
process where host.os.type == "windows" and event.type == "start" and
6163
process.parent.name : ("UMService.exe", "UMWorkerProcess.exe") and
62-
not process.executable :
63-
("?:\\Windows\\System32\\werfault.exe",
64-
"?:\\Windows\\System32\\wermgr.exe",
65-
"?:\\Program Files\\Microsoft\\Exchange Server\\V??\\Bin\\UMWorkerProcess.exe",
66-
"?:\\Program Files\\Microsoft\\Exchange Server\\Bin\\UMWorkerProcess.exe",
67-
"D:\\Exchange 2016\\Bin\\UMWorkerProcess.exe",
68-
"E:\\ExchangeServer\\Bin\\UMWorkerProcess.exe",
69-
"D:\\Exchange\\Bin\\UMWorkerProcess.exe",
70-
"D:\\Exchange Server\\Bin\\UMWorkerProcess.exe",
71-
"E:\\Exchange Server\\V15\\Bin\\UMWorkerProcess.exe")
64+
not process.executable : (
65+
"?:\\Windows\\System32\\werfault.exe",
66+
"?:\\Windows\\System32\\wermgr.exe",
67+
"?:\\Program Files\\Microsoft\\Exchange Server\\V??\\Bin\\UMWorkerProcess.exe",
68+
"?:\\Program Files\\Microsoft\\Exchange Server\\Bin\\UMWorkerProcess.exe",
69+
"D:\\Exchange 2016\\Bin\\UMWorkerProcess.exe",
70+
"E:\\ExchangeServer\\Bin\\UMWorkerProcess.exe",
71+
"D:\\Exchange\\Bin\\UMWorkerProcess.exe",
72+
"D:\\Exchange Server\\Bin\\UMWorkerProcess.exe",
73+
"E:\\Exchange Server\\V15\\Bin\\UMWorkerProcess.exe",
74+
"\\Device\\HarddiskVolume?\\Windows\\System32\\werfault.exe",
75+
"\\Device\\HarddiskVolume?\\Windows\\System32\\wermgr.exe",
76+
"\\Device\\HarddiskVolume?\\Program Files\\Microsoft\\Exchange Server\\V??\\Bin\\UMWorkerProcess.exe",
77+
"\\Device\\HarddiskVolume?\\Program Files\\Microsoft\\Exchange Server\\Bin\\UMWorkerProcess.exe",
78+
"\\Device\\HarddiskVolume?\\Exchange 2016\\Bin\\UMWorkerProcess.exe",
79+
"\\Device\\HarddiskVolume?\\ExchangeServer\\Bin\\UMWorkerProcess.exe",
80+
"\\Device\\HarddiskVolume?\\Exchange\\Bin\\UMWorkerProcess.exe",
81+
"\\Device\\HarddiskVolume?\\Exchange Server\\Bin\\UMWorkerProcess.exe",
82+
"\\Device\\HarddiskVolume?\\Exchange Server\\V15\\Bin\\UMWorkerProcess.exe"
83+
)
7284
'''
7385

7486

rules/windows/initial_access_suspicious_ms_office_child_process.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -92,6 +93,7 @@ tags = [
9293
"Data Source: Microsoft Defender for Endpoint",
9394
"Data Source: Sysmon",
9495
"Data Source: SentinelOne",
96+
"Data Source: Crowdstrike",
9597
]
9698
timestamp_override = "event.ingested"
9799
type = "eql"

rules/windows/initial_access_suspicious_ms_outlook_child_process.toml

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/10/31"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,7 +13,7 @@ Identifies suspicious child processes of Microsoft Outlook. These child processe
1313
phishing activity.
1414
"""
1515
from = "now-9m"
16-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
16+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-crowdstrike.fdr*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Suspicious MS Outlook Child Process"
@@ -66,16 +66,8 @@ This rule looks for suspicious processes spawned by MS Outlook, which can be the
6666
"""
6767
risk_score = 21
6868
rule_id = "32f4675e-6c49-4ace-80f9-97c9259dca2e"
69-
setup = """## Setup
70-
71-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
72-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
73-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
74-
`event.ingested` to @timestamp.
75-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
76-
"""
7769
severity = "low"
78-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Initial Access", "Tactic: Defense Evasion", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint", "Data Source: System"]
70+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Initial Access", "Tactic: Defense Evasion", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint", "Data Source: System", "Data Source: Crowdstrike"]
7971
timestamp_override = "event.ingested"
8072
type = "eql"
8173

rules/windows/lateral_movement_execution_from_tsclient_mup.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/11"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/17"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -44,6 +45,7 @@ tags = [
4445
"Data Source: Microsoft Defender for Endpoint",
4546
"Data Source: Sysmon",
4647
"Data Source: SentinelOne",
48+
"Data Source: Crowdstrike",
4749
]
4850
timestamp_override = "event.ingested"
4951
type = "eql"

rules/windows/lateral_movement_remote_file_copy_hidden_share.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/04"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -41,6 +42,7 @@ tags = [
4142
"Data Source: Microsoft Defender for Endpoint",
4243
"Data Source: Sysmon",
4344
"Data Source: SentinelOne",
45+
"Data Source: Crowdstrike",
4446
]
4547
timestamp_override = "event.ingested"
4648
type = "eql"

rules/windows/lateral_movement_unusual_dns_service_children.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/07/16"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/17"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -29,6 +29,7 @@ index = [
2929
"logs-system.security*",
3030
"logs-m365_defender.event-*",
3131
"logs-sentinel_one_cloud_funnel.*",
32+
"logs-crowdstrike.fdr*",
3233
]
3334
language = "eql"
3435
license = "Elastic License v2"
@@ -91,6 +92,7 @@ tags = [
9192
"Data Source: Microsoft Defender for Endpoint",
9293
"Data Source: Sysmon",
9394
"Data Source: SentinelOne",
95+
"Data Source: Crowdstrike",
9496
]
9597
timestamp_override = "event.ingested"
9698
type = "eql"

rules/windows/persistence_powershell_exch_mailbox_activesync_add_device.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/15"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -46,6 +47,7 @@ tags = [
4647
"Data Source: Microsoft Defender for Endpoint",
4748
"Data Source: Sysmon",
4849
"Data Source: SentinelOne",
50+
"Data Source: Crowdstrike",
4951
]
5052
timestamp_override = "event.ingested"
5153
type = "eql"

0 commit comments

Comments
 (0)