Skip to content

Commit d1b1027

Browse files
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 8 (#4233)
* [Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 8 * Update defense_evasion_powershell_windows_firewall_disabled.toml --------- Co-authored-by: shashank-elastic <[email protected]>
1 parent ef0f96c commit d1b1027

10 files changed

+65
-39
lines changed

rules/windows/defense_evasion_enable_inbound_rdp_with_netsh.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/10/13"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -77,6 +78,7 @@ tags = [
7778
"Data Source: Microsoft Defender for Endpoint",
7879
"Data Source: Sysmon",
7980
"Data Source: SentinelOne",
81+
"Data Source: Crowdstrike",
8082
]
8183
timestamp_override = "event.ingested"
8284
type = "eql"

rules/windows/defense_evasion_execution_lolbas_wuauclt.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/10/13"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -119,6 +120,7 @@ tags = [
119120
"Data Source: Microsoft Defender for Endpoint",
120121
"Data Source: Sysmon",
121122
"Data Source: SentinelOne",
123+
"Data Source: Crowdstrike",
122124
]
123125
timeline_id = "e70679c2-6cde-4510-9764-4823df18f7db"
124126
timeline_title = "Comprehensive Process Timeline"

rules/windows/defense_evasion_iis_httplogging_disabled.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/04/14"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -76,6 +77,7 @@ tags = [
7677
"Data Source: Microsoft Defender for Endpoint",
7778
"Data Source: Sysmon",
7879
"Data Source: SentinelOne",
80+
"Data Source: Crowdstrike",
7981
]
8082
timestamp_override = "event.ingested"
8183
type = "eql"

rules/windows/defense_evasion_lolbas_win_cdb_utility.toml

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2024/07/24"
3-
integration = ["endpoint", "windows", "system","sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "system","sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/11/02"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,21 +13,21 @@ An adversary can use the Windows command line debugging utility cdb.exe to execu
1313
for those instances and where the cdb.exe binary is outside of the normal WindowsKit installation paths.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-system.security-*"]
16+
index = [
17+
"logs-endpoint.events.process-*",
18+
"logs-windows.sysmon_operational-*",
19+
"endgame-*",
20+
"logs-sentinel_one_cloud_funnel.*",
21+
"logs-m365_defender.event-*",
22+
"logs-system.security-*",
23+
"logs-crowdstrike.fdr*"
24+
]
1725
language = "eql"
1826
license = "Elastic License v2"
1927
name = "Execution via Windows Command Debugging Utility"
2028
references = ["https://lolbas-project.github.io/lolbas/OtherMSBinaries/Cdb/"]
2129
risk_score = 47
2230
rule_id = "bdfaddc4-4438-48b4-bc43-9f5cf8151c46"
23-
setup = """## Setup
24-
25-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
26-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
27-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
28-
`event.ingested` to @timestamp.
29-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
30-
"""
3131
severity = "medium"
3232
tags = [
3333
"Domain: Endpoint",
@@ -38,7 +38,8 @@ tags = [
3838
"Data Source: Elastic Defend",
3939
"Data Source: Sysmon",
4040
"Data Source: SentinelOne",
41-
"Data Source: Microsoft Defender for Endpoint"
41+
"Data Source: Microsoft Defender for Endpoint",
42+
"Data Source: Crowdstrike"
4243
]
4344
timestamp_override = "event.ingested"
4445
type = "eql"
@@ -47,7 +48,12 @@ query = '''
4748
process where host.os.type == "windows" and event.type == "start" and
4849
(?process.pe.original_file_name == "CDB.Exe" or process.name : "cdb.exe") and
4950
process.args : ("-cf", "-c", "-pd") and
50-
not process.executable : ("?:\\Program Files (x86)\\*\\cdb.exe", "?:\\Program Files\\*\\cdb.exe")
51+
not process.executable : (
52+
"?:\\Program Files (x86)\\*\\cdb.exe",
53+
"?:\\Program Files\\*\\cdb.exe",
54+
"\\Device\\HarddiskVolume?\\Program Files (x86)\\*\\cdb.exe",
55+
"\\Device\\HarddiskVolume?\\Program Files\\*\\cdb.exe"
56+
)
5157
'''
5258

5359

rules/windows/defense_evasion_powershell_windows_firewall_disabled.toml

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/10/15"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -29,6 +29,7 @@ index = [
2929
"logs-system.security*",
3030
"logs-m365_defender.event-*",
3131
"logs-sentinel_one_cloud_funnel.*",
32+
"logs-crowdstrike.fdr*",
3233
]
3334
language = "eql"
3435
license = "Elastic License v2"
@@ -88,16 +89,20 @@ tags = [
8889
"Data Source: Microsoft Defender for Endpoint",
8990
"Data Source: Sysmon",
9091
"Data Source: SentinelOne",
92+
"Data Source: Crowdstrike",
9193
]
9294
timestamp_override = "event.ingested"
9395
type = "eql"
9496

9597
query = '''
96-
process where host.os.type == "windows" and event.action == "start" and
97-
(process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") or ?process.pe.original_file_name == "PowerShell.EXE") and
98-
process.args : "*Set-NetFirewallProfile*" and
99-
process.args : "*-Enabled*" and process.args : "*False*" and
100-
process.args : ("*-All*", "*Public*", "*Domain*", "*Private*")
98+
process where host.os.type == "windows" and event.type == "start" and
99+
(
100+
process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe") or
101+
?process.pe.original_file_name in ("powershell.exe", "pwsh.dll", "powershell_ise.exe")
102+
) and
103+
process.args : "*Set-NetFirewallProfile*" and
104+
process.args : "*-Enabled*" and process.args : "*False*" and
105+
process.args : ("*-All*", "*Public*", "*Domain*", "*Private*")
101106
'''
102107

103108

rules/windows/defense_evasion_sc_sdset.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
[metadata]
22
creation_date = "2024/07/16"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/11/02"
88

99
[rule]
1010
author = ["Elastic"]
1111
description = """
1212
Identifies DACL modifications to deny access to a service, making it unstoppable, or hide it from system and users.
1313
"""
1414
from = "now-9m"
15-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
15+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-crowdstrike.fdr*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Service DACL Modification via sc.exe"
@@ -35,7 +35,8 @@ tags = [
3535
"Data Source: Elastic Defend",
3636
"Data Source: Sysmon",
3737
"Data Source: SentinelOne",
38-
"Data Source: Microsoft Defender for Endpoint"
38+
"Data Source: Microsoft Defender for Endpoint",
39+
"Data Source: Crowdstrike"
3940
]
4041
timestamp_override = "event.ingested"
4142
type = "eql"

rules/windows/defense_evasion_suspicious_certutil_commands.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -49,6 +49,7 @@ index = [
4949
"logs-system.security*",
5050
"logs-m365_defender.event-*",
5151
"logs-sentinel_one_cloud_funnel.*",
52+
"logs-crowdstrike.fdr*",
5253
]
5354
language = "eql"
5455
license = "Elastic License v2"
@@ -125,6 +126,7 @@ tags = [
125126
"Data Source: Microsoft Defender for Endpoint",
126127
"Data Source: Sysmon",
127128
"Data Source: SentinelOne",
129+
"Data Source: Crowdstrike",
128130
]
129131
timeline_id = "e70679c2-6cde-4510-9764-4823df18f7db"
130132
timeline_title = "Comprehensive Process Timeline"

rules/windows/defense_evasion_wsl_enabled_via_dism.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/13"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -77,6 +78,7 @@ tags = [
7778
"Data Source: Microsoft Defender for Endpoint",
7879
"Data Source: Sysmon",
7980
"Data Source: SentinelOne",
81+
"Data Source: Crowdstrike",
8082
]
8183
timestamp_override = "event.ingested"
8284
type = "eql"

rules/windows/discovery_adfind_command_activity.toml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/10/19"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -85,13 +86,14 @@ tags = [
8586
"Data Source: Microsoft Defender for Endpoint",
8687
"Data Source: Sysmon",
8788
"Data Source: SentinelOne",
89+
"Data Source: Crowdstrike",
8890
]
8991
timestamp_override = "event.ingested"
9092
type = "eql"
9193

9294
query = '''
9395
process where host.os.type == "windows" and event.type == "start" and
94-
(process.name : "AdFind.exe" or ?process.pe.original_file_name == "AdFind.exe") and
96+
(process.name : "AdFind*.exe" or ?process.pe.original_file_name == "AdFind.exe") and
9597
process.args : ("objectcategory=computer", "(objectcategory=computer)",
9698
"objectcategory=person", "(objectcategory=person)",
9799
"objectcategory=subnet", "(objectcategory=subnet)",

rules/windows/discovery_admin_recon.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/04"
3-
integration = ["endpoint", "windows", "system", "m365_defender"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -20,6 +20,7 @@ index = [
2020
"endgame-*",
2121
"logs-system.security*",
2222
"logs-m365_defender.event-*",
23+
"logs-crowdstrike.fdr*",
2324
]
2425
language = "eql"
2526
license = "Elastic License v2"
@@ -69,6 +70,7 @@ tags = [
6970
"Data Source: Elastic Defend",
7071
"Data Source: System",
7172
"Data Source: Microsoft Defender for Endpoint",
73+
"Data Source: Crowdstrike",
7274
]
7375
timestamp_override = "event.ingested"
7476
type = "eql"

0 commit comments

Comments
 (0)