Skip to content

Commit 4b3bdae

Browse files
committed
Merge branch 'update_versioning_workflow' of github.com:elastic/detection-rules into update_versioning_workflow
2 parents 2af771d + 2bc1576 commit 4b3bdae

20 files changed

+132
-80
lines changed

rules/windows/credential_access_wbadmin_ntds.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2024/06/05"
3-
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -43,6 +44,7 @@ tags = [
4344
"Data Source: Microsoft Defender for Endpoint",
4445
"Data Source: Sysmon",
4546
"Data Source: SentinelOne",
47+
"Data Source: Crowdstrike",
4648
]
4749
timestamp_override = "event.ingested"
4850
type = "eql"

rules/windows/credential_access_wireless_creds_dumping.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2022/11/01"
3-
integration = ["endpoint", "system", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "system", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -45,6 +45,7 @@ index = [
4545
"logs-system.security*",
4646
"logs-m365_defender.event-*",
4747
"logs-sentinel_one_cloud_funnel.*",
48+
"logs-crowdstrike.fdr*",
4849
]
4950
language = "eql"
5051
license = "Elastic License v2"
@@ -110,6 +111,7 @@ tags = [
110111
"Data Source: Microsoft Defender for Endpoint",
111112
"Data Source: Sysmon",
112113
"Data Source: SentinelOne",
114+
"Data Source: Crowdstrike",
113115
]
114116
timestamp_override = "event.ingested"
115117
type = "eql"

rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -45,6 +45,7 @@ index = [
4545
"logs-system.security*",
4646
"logs-m365_defender.event-*",
4747
"logs-sentinel_one_cloud_funnel.*",
48+
"logs-crowdstrike.fdr*",
4849
]
4950
language = "eql"
5051
license = "Elastic License v2"
@@ -118,6 +119,7 @@ tags = [
118119
"Data Source: Microsoft Defender for Endpoint",
119120
"Data Source: Sysmon",
120121
"Data Source: SentinelOne",
122+
"Data Source: Crowdstrike",
121123
]
122124
timeline_id = "e70679c2-6cde-4510-9764-4823df18f7db"
123125
timeline_title = "Comprehensive Process Timeline"

rules/windows/defense_evasion_clearing_windows_console_history.toml

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/11/22"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -64,14 +65,6 @@ references = [
6465
]
6566
risk_score = 47
6667
rule_id = "b5877334-677f-4fb9-86d5-a9721274223b"
67-
setup = """## Setup
68-
69-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
70-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
71-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
72-
`event.ingested` to @timestamp.
73-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
74-
"""
7568
severity = "medium"
7669
tags = [
7770
"Domain: Endpoint",
@@ -86,16 +79,22 @@ tags = [
8679
"Data Source: Microsoft Defender for Endpoint",
8780
"Data Source: Sysmon",
8881
"Data Source: SentinelOne",
82+
"Data Source: Crowdstrike",
8983
]
9084
timestamp_override = "event.ingested"
9185
type = "eql"
9286

9387
query = '''
9488
process where host.os.type == "windows" and event.type == "start" and
95-
(process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") or ?process.pe.original_file_name == "PowerShell.EXE") and
96-
(process.args : "*Clear-History*" or
97-
(process.args : ("*Remove-Item*", "rm") and process.args : ("*ConsoleHost_history.txt*", "*(Get-PSReadlineOption).HistorySavePath*")) or
98-
(process.args : "*Set-PSReadlineOption*" and process.args : "*SaveNothing*"))
89+
(
90+
process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") or
91+
?process.pe.original_file_name in ("powershell.exe", "pwsh.dll", "powershell_ise.exe")
92+
) and
93+
(
94+
process.args : "*Clear-History*" or
95+
(process.args : ("*Remove-Item*", "rm") and process.args : ("*ConsoleHost_history.txt*", "*(Get-PSReadlineOption).HistorySavePath*")) or
96+
(process.args : "*Set-PSReadlineOption*" and process.args : "*SaveNothing*")
97+
)
9998
'''
10099

101100

rules/windows/defense_evasion_clearing_windows_event_logs.toml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -74,6 +75,7 @@ tags = [
7475
"Data Source: Microsoft Defender for Endpoint",
7576
"Data Source: Sysmon",
7677
"Data Source: SentinelOne",
78+
"Data Source: Crowdstrike",
7779
]
7880
timestamp_override = "event.ingested"
7981
type = "eql"
@@ -86,7 +88,10 @@ process where host.os.type == "windows" and event.type == "start" and
8688
process.args : ("/e:false", "cl", "clear-log")
8789
) or
8890
(
89-
process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") and
91+
(
92+
process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") or
93+
?process.pe.original_file_name in ("powershell.exe", "pwsh.dll", "powershell_ise.exe")
94+
) and
9095
process.args : "Clear-EventLog"
9196
)
9297
)

rules/windows/defense_evasion_code_signing_policy_modification_builtin_tools.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/31"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -41,6 +41,7 @@ index = [
4141
"logs-system.security*",
4242
"logs-m365_defender.event-*",
4343
"logs-sentinel_one_cloud_funnel.*",
44+
"logs-crowdstrike.fdr*",
4445
]
4546
language = "eql"
4647
license = "Elastic License v2"
@@ -108,6 +109,7 @@ tags = [
108109
"Data Source: Microsoft Defender for Endpoint",
109110
"Data Source: Sysmon",
110111
"Data Source: SentinelOne",
112+
"Data Source: Crowdstrike",
111113
]
112114
timestamp_override = "event.ingested"
113115
type = "eql"

rules/windows/defense_evasion_defender_exclusion_via_powershell.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/07/20"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -94,6 +95,7 @@ tags = [
9495
"Data Source: Microsoft Defender for Endpoint",
9596
"Data Source: Sysmon",
9697
"Data Source: SentinelOne",
98+
"Data Source: Crowdstrike",
9799
]
98100
timestamp_override = "event.ingested"
99101
type = "eql"

rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -73,6 +74,7 @@ tags = [
7374
"Data Source: Microsoft Defender for Endpoint",
7475
"Data Source: Sysmon",
7576
"Data Source: SentinelOne",
77+
"Data Source: Crowdstrike",
7678
]
7779
timestamp_override = "event.ingested"
7880
type = "eql"

rules/windows/defense_evasion_disabling_windows_defender_powershell.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/07/07"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -20,6 +20,7 @@ index = [
2020
"logs-system.security*",
2121
"logs-m365_defender.event-*",
2222
"logs-sentinel_one_cloud_funnel.*",
23+
"logs-crowdstrike.fdr*",
2324
]
2425
language = "eql"
2526
license = "Elastic License v2"
@@ -82,6 +83,7 @@ tags = [
8283
"Data Source: Microsoft Defender for Endpoint",
8384
"Data Source: Sysmon",
8485
"Data Source: SentinelOne",
86+
"Data Source: Crowdstrike",
8587
]
8688
timestamp_override = "event.ingested"
8789
type = "eql"

rules/windows/defense_evasion_disabling_windows_logs.toml

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/05/06"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -76,21 +77,28 @@ tags = [
7677
"Data Source: Microsoft Defender for Endpoint",
7778
"Data Source: Sysmon",
7879
"Data Source: SentinelOne",
80+
"Data Source: Crowdstrike",
7981
]
8082
timestamp_override = "event.ingested"
8183
type = "eql"
8284

8385
query = '''
8486
process where host.os.type == "windows" and event.type == "start" and
8587
(
86-
((process.name:"logman.exe" or ?process.pe.original_file_name == "Logman.exe") and
87-
process.args : "EventLog-*" and process.args : ("stop", "delete")) or
88-
89-
((process.name : ("pwsh.exe", "powershell.exe", "powershell_ise.exe") or ?process.pe.original_file_name in
90-
("pwsh.exe", "powershell.exe", "powershell_ise.exe")) and
91-
process.args : "Set-Service" and process.args: "EventLog" and process.args : "Disabled") or
92-
93-
((process.name:"auditpol.exe" or ?process.pe.original_file_name == "AUDITPOL.EXE") and process.args : "/success:disable")
88+
(
89+
(process.name:"logman.exe" or ?process.pe.original_file_name == "Logman.exe") and
90+
process.args : "EventLog-*" and process.args : ("stop", "delete")
91+
) or
92+
(
93+
(
94+
process.name : ("pwsh.exe", "powershell.exe", "powershell_ise.exe") or
95+
?process.pe.original_file_name in ("pwsh.exe", "powershell.exe", "powershell_ise.exe")
96+
) and
97+
process.args : "Set-Service" and process.args: "EventLog" and process.args : "Disabled"
98+
) or
99+
(
100+
(process.name:"auditpol.exe" or ?process.pe.original_file_name == "AUDITPOL.EXE") and process.args : "/success:disable"
101+
)
94102
)
95103
'''
96104

0 commit comments

Comments
 (0)