Skip to content

Commit 90a2e2b

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 5 (#4230)
* [Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 5 * Update collection_winrar_encryption.toml --------- Co-authored-by: shashank-elastic <[email protected]> (cherry picked from commit d5b5ba3)
1 parent 0190b77 commit 90a2e2b

10 files changed

+72
-37
lines changed

rules/windows/collection_winrar_encryption.toml

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/04"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -13,7 +13,14 @@ Identifies use of WinRar or 7z to create an encrypted files. Adversaries will of
1313
preparation for exfiltration.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*"]
16+
index = [
17+
"logs-endpoint.events.process-*",
18+
"winlogbeat-*",
19+
"logs-windows.sysmon_operational-*",
20+
"endgame-*",
21+
"logs-m365_defender.event-*",
22+
"logs-sentinel_one_cloud_funnel.*"
23+
]
1724
language = "eql"
1825
license = "Elastic License v2"
1926
name = "Encrypting Files with WinRar or 7z"
@@ -72,6 +79,9 @@ tags = [
7279
"Resources: Investigation Guide",
7380
"Data Source: Elastic Endgame",
7481
"Data Source: Elastic Defend",
82+
"Data Source: Sysmon",
83+
"Data Source: Microsoft Defender for Endpoint",
84+
"Data Source: SentinelOne"
7585
]
7686
timestamp_override = "event.ingested"
7787
type = "eql"
@@ -87,15 +97,19 @@ process where host.os.type == "windows" and event.type == "start" and
8797
process.args == "a" and process.args : ("-hp*", "-p*", "/hp*", "/p*")
8898
) or
8999
(
90-
?process.pe.original_file_name in ("7z.exe", "7za.exe") and
100+
(process.name : ("7z.exe", "7za.exe") or ?process.pe.original_file_name in ("7z.exe", "7za.exe")) and
91101
process.args == "a" and process.args : "-p*"
92102
)
93103
) and
94104
not process.parent.executable : (
95105
"C:\\Program Files\\*.exe",
96106
"C:\\Program Files (x86)\\*.exe",
97107
"?:\\ManageEngine\\*\\jre\\bin\\java.exe",
98-
"?:\\Nox\\bin\\Nox.exe"
108+
"?:\\Nox\\bin\\Nox.exe",
109+
"\\Device\\HarddiskVolume?\\Program Files\\*.exe",
110+
"\\Device\\HarddiskVolume?\\Program Files (x86)\\*.exe",
111+
"\\Device\\HarddiskVolume?\\ManageEngine\\*\\jre\\bin\\java.exe",
112+
"\\Device\\HarddiskVolume?\\Nox\\bin\\Nox.exe"
99113
)
100114
'''
101115

rules/windows/persistence_system_shells_via_services.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/11/02"
88

99
[transform]
1010
[[transform.osquery]]
@@ -34,7 +34,7 @@ Windows services typically run as SYSTEM and can be used as a privilege escalati
3434
testers may run a shell as a service to gain SYSTEM permissions.
3535
"""
3636
from = "now-9m"
37-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
37+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-crowdstrike.fdr*"]
3838
language = "eql"
3939
license = "Elastic License v2"
4040
name = "System Shells via Services"
@@ -81,7 +81,7 @@ This rule looks for system shells being spawned by `services.exe`, which is comp
8181
risk_score = 47
8282
rule_id = "0022d47d-39c7-4f69-a232-4fe9dc7a3acd"
8383
severity = "medium"
84-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Persistence", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint", "Data Source: System"]
84+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Persistence", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint", "Data Source: System", "Data Source: Crowdstrike"]
8585
timestamp_override = "event.ingested"
8686
type = "eql"
8787

rules/windows/persistence_user_account_creation.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -74,14 +75,14 @@ tags = [
7475
"Data Source: Microsoft Defender for Endpoint",
7576
"Data Source: Sysmon",
7677
"Data Source: SentinelOne",
78+
"Data Source: Crowdstrike",
7779
]
7880
timestamp_override = "event.ingested"
7981
type = "eql"
8082

8183
query = '''
8284
process where host.os.type == "windows" and event.type == "start" and
83-
process.name : ("net.exe", "net1.exe") and
84-
not process.parent.name : "net.exe" and
85+
(process.name : ("net.exe", "net1.exe") and not process.parent.name : "net.exe") and
8586
(process.args : "user" and process.args : ("/ad", "/add"))
8687
'''
8788

rules/windows/persistence_via_application_shimming.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -41,6 +42,7 @@ tags = [
4142
"Data Source: Microsoft Defender for Endpoint",
4243
"Data Source: Sysmon",
4344
"Data Source: SentinelOne",
45+
"Data Source: Crowdstrike",
4446
]
4547
timestamp_override = "event.ingested"
4648
type = "eql"

rules/windows/persistence_via_telemetrycontroller_scheduledtask_hijack.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/17"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -42,6 +43,7 @@ tags = [
4243
"Data Source: Microsoft Defender for Endpoint",
4344
"Data Source: Sysmon",
4445
"Data Source: SentinelOne",
46+
"Data Source: Crowdstrike",
4547
]
4648
timestamp_override = "event.ingested"
4749
type = "eql"

rules/windows/persistence_webshell_detection.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2021/08/24"
3-
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/11/02"
88

99
[rule]
1010
author = ["Elastic"]
@@ -16,7 +16,7 @@ false_positives = [
1616
""",
1717
]
1818
from = "now-9m"
19-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
19+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-crowdstrike.fdr*"]
2020
language = "eql"
2121
license = "Elastic License v2"
2222
name = "Web Shell Detection: Script Process Child of Common Web Processes"
@@ -71,7 +71,7 @@ references = [
7171
risk_score = 73
7272
rule_id = "2917d495-59bd-4250-b395-c29409b76086"
7373
severity = "high"
74-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Persistence", "Tactic: Initial Access", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: System", "Data Source: Microsoft Defender for Endpoint", "Data Source: Sysmon"]
74+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Persistence", "Tactic: Initial Access", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: System", "Data Source: Microsoft Defender for Endpoint", "Data Source: Sysmon", "Data Source: Crowdstrike"]
7575
timestamp_override = "event.ingested"
7676
type = "eql"
7777

rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -42,16 +43,22 @@ tags = [
4243
"Data Source: Microsoft Defender for Endpoint",
4344
"Data Source: Sysmon",
4445
"Data Source: SentinelOne",
46+
"Data Source: Crowdstrike",
4547
]
4648
timestamp_override = "event.ingested"
4749
type = "eql"
4850

4951
query = '''
5052
process where host.os.type == "windows" and event.type == "start" and
5153
process.args : "/autoclean" and process.args : "/d" and process.executable != null and
52-
not process.executable : ("C:\\Windows\\System32\\cleanmgr.exe",
53-
"C:\\Windows\\SysWOW64\\cleanmgr.exe",
54-
"C:\\Windows\\System32\\taskhostw.exe")
54+
not process.executable : (
55+
"C:\\Windows\\System32\\cleanmgr.exe",
56+
"C:\\Windows\\SysWOW64\\cleanmgr.exe",
57+
"C:\\Windows\\System32\\taskhostw.exe",
58+
"\\Device\\HarddiskVolume?\\Windows\\System32\\cleanmgr.exe",
59+
"\\Device\\HarddiskVolume?\\Windows\\SysWOW64\\cleanmgr.exe",
60+
"\\Device\\HarddiskVolume?\\Windows\\System32\\taskhostw.exe"
61+
)
5562
'''
5663

5764

rules/windows/privilege_escalation_uac_bypass_event_viewer.toml

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/03/17"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -122,18 +123,22 @@ tags = [
122123
"Data Source: System",
123124
"Data Source: Sysmon",
124125
"Data Source: SentinelOne",
126+
"Data Source: Crowdstrike",
125127
]
126128
timestamp_override = "event.ingested"
127129
type = "eql"
128130

129131
query = '''
130132
process where host.os.type == "windows" and event.type == "start" and
131133
process.parent.name : "eventvwr.exe" and
132-
not process.executable :
133-
("?:\\Windows\\SysWOW64\\mmc.exe",
134-
"?:\\Windows\\System32\\mmc.exe",
135-
"?:\\Windows\\SysWOW64\\WerFault.exe",
136-
"?:\\Windows\\System32\\WerFault.exe")
134+
not process.executable : (
135+
"?:\\Windows\\SysWOW64\\mmc.exe",
136+
"?:\\Windows\\System32\\mmc.exe",
137+
"?:\\Windows\\SysWOW64\\WerFault.exe",
138+
"?:\\Windows\\System32\\WerFault.exe",
139+
"?\\Device\\HarddiskVolume?\\Windows\\Sys?????\\mmc.exe",
140+
"?\\Device\\HarddiskVolume?\\Windows\\Sys?????\\WerFault.exe"
141+
)
137142
'''
138143

139144

rules/windows/privilege_escalation_uac_bypass_mock_windir.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/10/26"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -122,6 +123,7 @@ tags = [
122123
"Data Source: Microsoft Defender for Endpoint",
123124
"Data Source: Sysmon",
124125
"Data Source: SentinelOne",
126+
"Data Source: Crowdstrike",
125127
]
126128
timestamp_override = "event.ingested"
127129
type = "eql"

rules/windows/privilege_escalation_unusual_parentchild_relationship.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -122,6 +123,7 @@ tags = [
122123
"Data Source: Microsoft Defender for Endpoint",
123124
"Data Source: Sysmon",
124125
"Data Source: SentinelOne",
126+
"Data Source: Crowdstrike",
125127
]
126128
timestamp_override = "event.ingested"
127129
type = "eql"

0 commit comments

Comments
 (0)