Skip to content

Commit 54af0df

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 6 (#4231)
* [Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 6 * Update credential_access_cmdline_dump_tool.toml * Update defense_evasion_powershell_windows_firewall_disabled.toml * Revert "Update defense_evasion_powershell_windows_firewall_disabled.toml" This reverts commit d2df2a8. * Update lateral_movement_via_wsus_update.toml --------- Co-authored-by: shashank-elastic <[email protected]> (cherry picked from commit a743b9c)
1 parent 90a2e2b commit 54af0df

10 files changed

+44
-32
lines changed

rules/windows/command_and_control_certreq_postdata.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/13"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -122,6 +123,7 @@ tags = [
122123
"Data Source: Microsoft Defender for Endpoint",
123124
"Data Source: Sysmon",
124125
"Data Source: SentinelOne",
126+
"Data Source: Crowdstrike",
125127
]
126128
timestamp_override = "event.ingested"
127129
type = "eql"

rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -70,7 +70,7 @@ Identifies the desktopimgdownldr utility being used to download a remote file. A
7070
download arbitrary files as an alternative to certutil.
7171
"""
7272
from = "now-9m"
73-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*"]
73+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "logs-crowdstrike.fdr*"]
7474
language = "eql"
7575
license = "Elastic License v2"
7676
name = "Remote File Download via Desktopimgdownldr Utility"
@@ -148,6 +148,7 @@ tags = [
148148
"Data Source: Microsoft Defender for Endpoint",
149149
"Data Source: SentinelOne",
150150
"Data Source: Sysmon",
151+
"Data Source: Crowdstrike",
151152
]
152153
timestamp_override = "event.ingested"
153154
type = "eql"

rules/windows/command_and_control_remote_file_copy_mpcmdrun.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -67,7 +67,7 @@ providers = [
6767
author = ["Elastic"]
6868
description = "Identifies the Windows Defender configuration utility (MpCmdRun.exe) being used to download a remote file."
6969
from = "now-9m"
70-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*"]
70+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "logs-crowdstrike.fdr*"]
7171
language = "eql"
7272
license = "Elastic License v2"
7373
name = "Remote File Download via MpCmdRun"
@@ -146,6 +146,7 @@ tags = [
146146
"Data Source: Microsoft Defender for Endpoint",
147147
"Data Source: Sysmon",
148148
"Data Source: SentinelOne",
149+
"Data Source: Crowdstrike",
149150
]
150151
timestamp_override = "event.ingested"
151152
type = "eql"

rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/24"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -129,6 +130,7 @@ tags = [
129130
"Data Source: Microsoft Defender for Endpoint",
130131
"Data Source: SentinelOne",
131132
"Data Source: Sysmon",
133+
"Data Source: Crowdstrike",
132134
]
133135
timestamp_override = "event.ingested"
134136
type = "eql"

rules/windows/credential_access_dump_registry_hives.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/23"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -19,6 +19,7 @@ index = [
1919
"logs-system.security*",
2020
"logs-m365_defender.event-*",
2121
"logs-sentinel_one_cloud_funnel.*",
22+
"logs-crowdstrike.fdr*",
2223
]
2324
language = "eql"
2425
license = "Elastic License v2"
@@ -81,6 +82,7 @@ tags = [
8182
"Data Source: Microsoft Defender for Endpoint",
8283
"Data Source: SentinelOne",
8384
"Data Source: Sysmon",
85+
"Data Source: Crowdstrike",
8486
]
8587
timestamp_override = "event.ingested"
8688
type = "eql"

rules/windows/credential_access_iis_connectionstrings_dumping.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -46,6 +47,7 @@ tags = [
4647
"Data Source: Microsoft Defender for Endpoint",
4748
"Data Source: Sysmon",
4849
"Data Source: SentinelOne",
50+
"Data Source: Crowdstrike",
4951
]
5052
timestamp_override = "event.ingested"
5153
type = "eql"

rules/windows/credential_access_saved_creds_vaultcmd.toml

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/01/19"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/17"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -34,14 +35,6 @@ references = [
3435
]
3536
risk_score = 47
3637
rule_id = "be8afaed-4bcd-4e0a-b5f9-5562003dde81"
37-
setup = """## Setup
38-
39-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
40-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
41-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
42-
`event.ingested` to @timestamp.
43-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
44-
"""
4538
severity = "medium"
4639
tags = [
4740
"Domain: Endpoint",
@@ -54,6 +47,7 @@ tags = [
5447
"Data Source: Microsoft Defender for Endpoint",
5548
"Data Source: Sysmon",
5649
"Data Source: SentinelOne",
50+
"Data Source: Crowdstrike",
5751
]
5852
timestamp_override = "event.ingested"
5953
type = "eql"

rules/windows/credential_access_symbolic_link_to_shadow_copy_created.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/12/25"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -106,6 +107,7 @@ tags = [
106107
"Data Source: Microsoft Defender for Endpoint",
107108
"Data Source: Sysmon",
108109
"Data Source: SentinelOne",
110+
"Data Source: Crowdstrike",
109111
]
110112
timestamp_override = "event.ingested"
111113
type = "eql"

rules/windows/credential_access_veeam_commands.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2024/03/14"
3-
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -42,6 +43,7 @@ tags = [
4243
"Data Source: Microsoft Defender for Endpoint",
4344
"Data Source: Sysmon",
4445
"Data Source: SentinelOne",
46+
"Data Source: Crowdstrike",
4547
]
4648
timestamp_override = "event.ingested"
4749
type = "eql"

rules/windows/lateral_movement_via_wsus_update.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2024/07/19"
3-
integration = ["endpoint", "windows", "system","sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "system","sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/11/02"
88

99
[rule]
1010
author = ["Elastic"]
@@ -14,7 +14,7 @@ WSUS is limited to executing Microsoft signed binaries, which limits the executa
1414
by Microsoft.
1515
"""
1616
from = "now-9m"
17-
index = ["logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-system.security-*", "winlogbeat-*"]
17+
index = ["logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-system.security-*", "winlogbeat-*", "logs-crowdstrike.fdr*"]
1818
language = "eql"
1919
license = "Elastic License v2"
2020
name = "Potential WSUS Abuse for Lateral Movement"
@@ -33,13 +33,17 @@ tags = [
3333
"Data Source: SentinelOne",
3434
"Data Source: Microsoft Defender for Endpoint",
3535
"Data Source: System",
36+
"Data Source: Crowdstrike",
3637
]
3738
timestamp_override = "event.ingested"
3839
type = "eql"
3940

4041
query = '''
4142
process where host.os.type == "windows" and event.type == "start" and process.parent.name : "wuauclt.exe" and
42-
process.executable : "?:\\Windows\\SoftwareDistribution\\Download\\Install\\*" and
43+
process.executable : (
44+
"?:\\Windows\\SoftwareDistribution\\Download\\Install\\*",
45+
"\\Device\\HarddiskVolume?\\Windows\\SoftwareDistribution\\Download\\Install\\*"
46+
) and
4347
(process.name : "psexec64.exe" or ?process.pe.original_file_name : "psexec.c")
4448
'''
4549

0 commit comments

Comments
 (0)