Skip to content

Commit 80841b5

Browse files
w0rk3rSamirbous
andauthored
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 2 (#4221)
* [Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 2 * Update rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml Co-authored-by: Samirbous <[email protected]> --------- Co-authored-by: Samirbous <[email protected]>
1 parent 81292ae commit 80841b5

10 files changed

+70
-56
lines changed

rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/07/07"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -73,6 +74,7 @@ tags = [
7374
"Data Source: Microsoft Defender for Endpoint",
7475
"Data Source: Sysmon",
7576
"Data Source: SentinelOne",
77+
"Data Source: Crowdstrike",
7678
]
7779
timestamp_override = "event.ingested"
7880
type = "eql"

rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml

Lines changed: 15 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/09/08"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,21 +22,14 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
2829
name = "Control Panel Process with Unusual Arguments"
2930
references = ["https://www.joesandbox.com/analysis/476188/1/html"]
3031
risk_score = 73
3132
rule_id = "416697ae-e468-4093-a93d-59661fa619ec"
32-
setup = """## Setup
33-
34-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
35-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
36-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
37-
`event.ingested` to @timestamp.
38-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
39-
"""
4033
severity = "high"
4134
tags = [
4235
"Domain: Endpoint",
@@ -50,26 +43,24 @@ tags = [
5043
"Data Source: Microsoft Defender for Endpoint",
5144
"Data Source: Sysmon",
5245
"Data Source: SentinelOne",
46+
"Data Source: Crowdstrike",
5347
]
5448
timestamp_override = "event.ingested"
5549
type = "eql"
5650

5751
query = '''
5852
process where host.os.type == "windows" and event.type == "start" and
59-
process.executable : ("?:\\Windows\\SysWOW64\\control.exe", "?:\\Windows\\System32\\control.exe") and
60-
process.command_line :
61-
("*.jpg*",
62-
"*.png*",
63-
"*.gif*",
64-
"*.bmp*",
65-
"*.jpeg*",
66-
"*.TIFF*",
67-
"*.inf*",
68-
"*.cpl:*/*",
69-
"*../../..*",
70-
"*/AppData/Local/*",
71-
"*:\\Users\\Public\\*",
72-
"*\\AppData\\Local\\*")
53+
process.name : "control.exe" and
54+
process.command_line : (
55+
"*.jpg*", "*.png*",
56+
"*.gif*", "*.bmp*",
57+
"*.jpeg*", "*.TIFF*",
58+
"*.inf*", "*.cpl:*/*",
59+
"*../../..*",
60+
"*/AppData/Local/*",
61+
"*:\\Users\\Public\\*",
62+
"*\\AppData\\Local\\*"
63+
)
7364
'''
7465

7566

rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/03/25"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -28,6 +28,7 @@ index = [
2828
"logs-system.security*",
2929
"logs-m365_defender.event-*",
3030
"logs-sentinel_one_cloud_funnel.*",
31+
"logs-crowdstrike.fdr*",
3132
]
3233
language = "eql"
3334
license = "Elastic License v2"
@@ -99,6 +100,7 @@ tags = [
99100
"Data Source: Microsoft Defender for Endpoint",
100101
"Data Source: Sysmon",
101102
"Data Source: SentinelOne",
103+
"Data Source: Crowdstrike",
102104
]
103105
timestamp_override = "event.ingested"
104106
type = "eql"

rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/03/25"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -42,6 +43,7 @@ tags = [
4243
"Data Source: Microsoft Defender for Endpoint",
4344
"Data Source: Sysmon",
4445
"Data Source: SentinelOne",
46+
"Data Source: Crowdstrike",
4547
]
4648
timestamp_override = "event.ingested"
4749
type = "eql"

rules/windows/defense_evasion_suspicious_managedcode_host_process.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/21"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -13,7 +13,7 @@ Identifies a suspicious managed code hosting process which could indicate code i
1313
code execution.
1414
"""
1515
from = "now-9m"
16-
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "endgame-*"]
16+
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "endgame-*", "logs-crowdstrike.fdr*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Suspicious Managed Code Hosting Process"
@@ -33,6 +33,7 @@ tags = [
3333
"Data Source: Microsoft Defender for Endpoint",
3434
"Data Source: SentinelOne",
3535
"Data Source: Elastic Endgame",
36+
"Data Source: Crowdstrike",
3637
]
3738
timestamp_override = "event.ingested"
3839
type = "eql"

rules/windows/defense_evasion_suspicious_zoom_child_process.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/17"
7+
updated_date = "2024/10/31"
88

99
[transform]
1010
[[transform.osquery]]
@@ -39,7 +39,7 @@ A suspicious Zoom child process was detected, which may indicate an attempt to r
3939
such as command line, network connections, file writes and associated file signature details as well.
4040
"""
4141
from = "now-9m"
42-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
42+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-crowdstrike.fdr*"]
4343
language = "eql"
4444
license = "Elastic License v2"
4545
name = "Suspicious Zoom Child Process"
@@ -97,7 +97,7 @@ This rule identifies a potential malicious process masquerading as `Zoom.exe` or
9797
risk_score = 47
9898
rule_id = "97aba1ef-6034-4bd3-8c1a-1e0996b27afa"
9999
severity = "medium"
100-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Tactic: Execution", "Data Source: Elastic Endgame", "Resources: Investigation Guide", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint", "Data Source: System"]
100+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Tactic: Execution", "Data Source: Elastic Endgame", "Resources: Investigation Guide", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint", "Data Source: System", "Data Source: Crowdstrike"]
101101
timestamp_override = "event.ingested"
102102
type = "eql"
103103

rules/windows/defense_evasion_unusual_dir_ads.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/04"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -13,7 +13,7 @@ Identifies processes running from an Alternate Data Stream. This is uncommon for
1313
by adversaries to hide malware.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*"]
16+
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "logs-crowdstrike.fdr*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Unusual Process Execution Path - Alternate Data Stream"
@@ -30,6 +30,7 @@ tags = [
3030
"Data Source: Sysmon",
3131
"Data Source: Microsoft Defender for Endpoint",
3232
"Data Source: SentinelOne",
33+
"Data Source: Crowdstrike",
3334
]
3435
timestamp_override = "event.ingested"
3536
type = "eql"

rules/windows/defense_evasion_workfolders_control_execution.toml

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2022/03/02"
3-
integration = ["windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -20,7 +20,8 @@ index = [
2020
"endgame-*",
2121
"logs-system.security*",
2222
"logs-m365_defender.event-*",
23-
"logs-sentinel_one_cloud_funnel.*"
23+
"logs-sentinel_one_cloud_funnel.*",
24+
"logs-crowdstrike.fdr*"
2425
]
2526
language = "eql"
2627
license = "Elastic License v2"
@@ -75,14 +76,20 @@ tags = [
7576
"Data Source: Microsoft Defender for Endpoint",
7677
"Data Source: Sysmon",
7778
"Data Source: SentinelOne",
79+
"Data Source: Crowdstrike",
7880
]
7981
timestamp_override = "event.ingested"
8082
type = "eql"
8183

8284
query = '''
83-
process where host.os.type == "windows" and event.type == "start"
84-
and process.name : "control.exe" and process.parent.name : "WorkFolders.exe"
85-
and not process.executable : ("?:\\Windows\\System32\\control.exe", "?:\\Windows\\SysWOW64\\control.exe")
85+
process where host.os.type == "windows" and event.type == "start" and
86+
process.name : "control.exe" and process.parent.name : "WorkFolders.exe" and
87+
not process.executable : (
88+
"?:\\Windows\\System32\\control.exe",
89+
"?:\\Windows\\SysWOW64\\control.exe",
90+
"\\Device\\HarddiskVolume?\\Windows\\System32\\control.exe",
91+
"\\Device\\HarddiskVolume?\\Windows\\SysWOW64\\control.exe"
92+
)
8693
'''
8794

8895

rules/windows/defense_evasion_wsl_kalilinux.toml

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/12"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -41,19 +42,24 @@ tags = [
4142
"Data Source: Microsoft Defender for Endpoint",
4243
"Data Source: Sysmon",
4344
"Data Source: SentinelOne",
45+
"Data Source: Crowdstrike",
4446
]
4547
timestamp_override = "event.ingested"
4648
type = "eql"
4749

4850
query = '''
4951
process where host.os.type == "windows" and event.type == "start" and
5052
(
51-
(process.name : "wsl.exe" and process.args : ("-d", "--distribution", "-i", "--install") and process.args : "kali*") or
52-
process.executable :
53-
("?:\\Users\\*\\AppData\\Local\\packages\\kalilinux*",
54-
"?:\\Users\\*\\AppData\\Local\\Microsoft\\WindowsApps\\kali.exe",
55-
"?:\\Program Files*\\WindowsApps\\KaliLinux.*\\kali.exe")
56-
)
53+
(process.name : "wsl.exe" and process.args : ("-d", "--distribution", "-i", "--install") and process.args : "kali*") or
54+
process.executable : (
55+
"?:\\Users\\*\\AppData\\Local\\packages\\kalilinux*",
56+
"?:\\Users\\*\\AppData\\Local\\Microsoft\\WindowsApps\\kali.exe",
57+
"?:\\Program Files*\\WindowsApps\\KaliLinux.*\\kali.exe",
58+
"\\Device\\HarddiskVolume?\\Users\\*\\AppData\\Local\\packages\\kalilinux*",
59+
"\\Device\\HarddiskVolume?\\Users\\*\\AppData\\Local\\Microsoft\\WindowsApps\\kali.exe",
60+
"\\Device\\HarddiskVolume?\\Program Files*\\WindowsApps\\KaliLinux.*\\kali.exe"
61+
)
62+
)
5763
'''
5864

5965

rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2022/05/31"
3-
integration = ["endpoint", "windows", "system", "m365_defender"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -28,6 +28,7 @@ index = [
2828
"endgame-*",
2929
"logs-system.security*",
3030
"logs-m365_defender.event-*",
31+
"logs-crowdstrike.fdr*",
3132
]
3233
language = "eql"
3334
license = "Elastic License v2"
@@ -81,6 +82,7 @@ tags = [
8182
"Data Source: System",
8283
"Data Source: Microsoft Defender for Endpoint",
8384
"Data Source: Sysmon",
85+
"Data Source: Crowdstrike",
8486
]
8587
timestamp_override = "event.ingested"
8688
type = "eql"

0 commit comments

Comments
 (0)