Skip to content

Commit e354fee

Browse files
committed
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 6
1 parent 581ef73 commit e354fee

10 files changed

+40
-30
lines changed

rules/windows/command_and_control_certreq_postdata.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/13"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -122,6 +123,7 @@ tags = [
122123
"Data Source: Microsoft Defender for Endpoint",
123124
"Data Source: Sysmon",
124125
"Data Source: SentinelOne",
126+
"Data Source: Crowdstrike",
125127
]
126128
timestamp_override = "event.ingested"
127129
type = "eql"

rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -70,7 +70,7 @@ Identifies the desktopimgdownldr utility being used to download a remote file. A
7070
download arbitrary files as an alternative to certutil.
7171
"""
7272
from = "now-9m"
73-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*"]
73+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "logs-crowdstrike.fdr*"]
7474
language = "eql"
7575
license = "Elastic License v2"
7676
name = "Remote File Download via Desktopimgdownldr Utility"
@@ -148,6 +148,7 @@ tags = [
148148
"Data Source: Microsoft Defender for Endpoint",
149149
"Data Source: SentinelOne",
150150
"Data Source: Sysmon",
151+
"Data Source: Crowdstrike",
151152
]
152153
timestamp_override = "event.ingested"
153154
type = "eql"

rules/windows/command_and_control_remote_file_copy_mpcmdrun.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -67,7 +67,7 @@ providers = [
6767
author = ["Elastic"]
6868
description = "Identifies the Windows Defender configuration utility (MpCmdRun.exe) being used to download a remote file."
6969
from = "now-9m"
70-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*"]
70+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.forwarded*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-system.security*", "logs-m365_defender.event-*", "logs-sentinel_one_cloud_funnel.*", "logs-crowdstrike.fdr*"]
7171
language = "eql"
7272
license = "Elastic License v2"
7373
name = "Remote File Download via MpCmdRun"
@@ -146,6 +146,7 @@ tags = [
146146
"Data Source: Microsoft Defender for Endpoint",
147147
"Data Source: Sysmon",
148148
"Data Source: SentinelOne",
149+
"Data Source: Crowdstrike",
149150
]
150151
timestamp_override = "event.ingested"
151152
type = "eql"

rules/windows/credential_access_cmdline_dump_tool.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/24"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/17"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -80,6 +81,7 @@ tags = [
8081
"Data Source: Microsoft Defender for Endpoint",
8182
"Data Source: SentinelOne",
8283
"Data Source: Sysmon",
84+
"Data Source: Crowdstrike",
8385
]
8486
timestamp_override = "event.ingested"
8587
type = "eql"

rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/24"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -48,6 +48,7 @@ index = [
4848
"logs-system.security*",
4949
"logs-m365_defender.event-*",
5050
"logs-sentinel_one_cloud_funnel.*",
51+
"logs-crowdstrike.fdr*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -129,6 +130,7 @@ tags = [
129130
"Data Source: Microsoft Defender for Endpoint",
130131
"Data Source: SentinelOne",
131132
"Data Source: Sysmon",
133+
"Data Source: Crowdstrike",
132134
]
133135
timestamp_override = "event.ingested"
134136
type = "eql"

rules/windows/credential_access_dump_registry_hives.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/23"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -19,6 +19,7 @@ index = [
1919
"logs-system.security*",
2020
"logs-m365_defender.event-*",
2121
"logs-sentinel_one_cloud_funnel.*",
22+
"logs-crowdstrike.fdr*",
2223
]
2324
language = "eql"
2425
license = "Elastic License v2"
@@ -81,6 +82,7 @@ tags = [
8182
"Data Source: Microsoft Defender for Endpoint",
8283
"Data Source: SentinelOne",
8384
"Data Source: Sysmon",
85+
"Data Source: Crowdstrike",
8486
]
8587
timestamp_override = "event.ingested"
8688
type = "eql"

rules/windows/credential_access_iis_connectionstrings_dumping.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -46,6 +47,7 @@ tags = [
4647
"Data Source: Microsoft Defender for Endpoint",
4748
"Data Source: Sysmon",
4849
"Data Source: SentinelOne",
50+
"Data Source: Crowdstrike",
4951
]
5052
timestamp_override = "event.ingested"
5153
type = "eql"

rules/windows/credential_access_saved_creds_vaultcmd.toml

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/01/19"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/17"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -34,14 +35,6 @@ references = [
3435
]
3536
risk_score = 47
3637
rule_id = "be8afaed-4bcd-4e0a-b5f9-5562003dde81"
37-
setup = """## Setup
38-
39-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
40-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
41-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
42-
`event.ingested` to @timestamp.
43-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
44-
"""
4538
severity = "medium"
4639
tags = [
4740
"Domain: Endpoint",
@@ -54,6 +47,7 @@ tags = [
5447
"Data Source: Microsoft Defender for Endpoint",
5548
"Data Source: Sysmon",
5649
"Data Source: SentinelOne",
50+
"Data Source: Crowdstrike",
5751
]
5852
timestamp_override = "event.ingested"
5953
type = "eql"

rules/windows/credential_access_symbolic_link_to_shadow_copy_created.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/12/25"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -106,6 +107,7 @@ tags = [
106107
"Data Source: Microsoft Defender for Endpoint",
107108
"Data Source: Sysmon",
108109
"Data Source: SentinelOne",
110+
"Data Source: Crowdstrike",
109111
]
110112
timestamp_override = "event.ingested"
111113
type = "eql"

rules/windows/credential_access_veeam_commands.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2024/03/14"
3-
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/11/02"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -42,6 +43,7 @@ tags = [
4243
"Data Source: Microsoft Defender for Endpoint",
4344
"Data Source: Sysmon",
4445
"Data Source: SentinelOne",
46+
"Data Source: Crowdstrike",
4547
]
4648
timestamp_override = "event.ingested"
4749
type = "eql"

0 commit comments

Comments
 (0)