Skip to content

Commit ee1859a

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 3 (#4222)
(cherry picked from commit 2b6116e)
1 parent 674d3b9 commit ee1859a

10 files changed

+82
-29
lines changed

rules/windows/defense_evasion_masquerading_trusted_directory.toml

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -23,6 +23,7 @@ index = [
2323
"logs-system.security*",
2424
"logs-m365_defender.event-*",
2525
"logs-sentinel_one_cloud_funnel.*",
26+
"logs-crowdstrike.fdr*",
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -41,13 +42,17 @@ tags = [
4142
"Data Source: Microsoft Defender for Endpoint",
4243
"Data Source: Sysmon",
4344
"Data Source: SentinelOne",
45+
"Data Source: Crowdstrike",
4446
]
4547
timestamp_override = "event.ingested"
4648
type = "eql"
4749

4850
query = '''
4951
process where host.os.type == "windows" and event.type == "start" and
50-
process.executable : "C:\\*Program*Files*\\*.exe" and
52+
process.executable : (
53+
"C:\\*Program*Files*\\*.exe",
54+
"\\Device\\HarddiskVolume?\\*Program*Files*\\*.exe"
55+
) and
5156
not process.executable : (
5257
"?:\\Program Files\\*.exe",
5358
"?:\\Program Files (x86)\\*.exe",
@@ -56,6 +61,18 @@ process where host.os.type == "windows" and event.type == "start" and
5661
"?:\\Windows\\Downloaded Program Files\\*.exe",
5762
"?:\\Windows\\Temp\\.opera\\????????????\\CProgram?FilesOpera*\\*.exe",
5863
"?:\\Windows\\Temp\\.opera\\????????????\\CProgram?Files?(x86)Opera*\\*.exe"
64+
) and
65+
not (
66+
event.dataset == "crowdstrike.fdr" and
67+
process.executable : (
68+
"\\Device\\HarddiskVolume?\\Program Files\\*.exe",
69+
"\\Device\\HarddiskVolume?\\Program Files (x86)\\*.exe",
70+
"\\Device\\HarddiskVolume?\\Users\\*.exe",
71+
"\\Device\\HarddiskVolume?\\ProgramData\\*.exe",
72+
"\\Device\\HarddiskVolume?\\Windows\\Downloaded Program Files\\*.exe",
73+
"\\Device\\HarddiskVolume?\\Windows\\Temp\\.opera\\????????????\\CProgram?FilesOpera*\\*.exe",
74+
"\\Device\\HarddiskVolume?\\Windows\\Temp\\.opera\\????????????\\CProgram?Files?(x86)Opera*\\*.exe"
75+
)
5976
)
6077
'''
6178

rules/windows/defense_evasion_wsl_child_process.toml

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/12"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -21,6 +21,7 @@ index = [
2121
"logs-system.security*",
2222
"logs-m365_defender.event-*",
2323
"logs-sentinel_one_cloud_funnel.*",
24+
"logs-crowdstrike.fdr*",
2425
]
2526
language = "eql"
2627
license = "Elastic License v2"
@@ -39,6 +40,7 @@ tags = [
3940
"Data Source: System",
4041
"Data Source: Microsoft Defender for Endpoint",
4142
"Data Source: SentinelOne",
43+
"Data Source: Crowdstrike",
4244
]
4345
timestamp_override = "event.ingested"
4446
type = "eql"
@@ -53,7 +55,19 @@ process where host.os.type == "windows" and event.type : "start" and
5355
"?:\\Windows\\System32\\conhost.exe",
5456
"?:\\Windows\\System32\\lxss\\wslhost.exe",
5557
"?:\\Windows\\System32\\WerFault.exe",
56-
"?:\\Windows\\Sys*\\wslconfig.exe"
58+
"?:\\Windows\\Sys?????\\wslconfig.exe"
59+
) and
60+
not (
61+
event.dataset == "crowdstrike.fdr" and
62+
process.executable : (
63+
"\\Device\\HarddiskVolume?\\Program Files (x86)\\*",
64+
"\\Device\\HarddiskVolume?\\Program Files\\*",
65+
"\\Device\\HarddiskVolume?\\Program Files*\\WindowsApps\\MicrosoftCorporationII.WindowsSubsystemForLinux_*\\wsl*.exe",
66+
"\\Device\\HarddiskVolume?\\Windows\\System32\\conhost.exe",
67+
"\\Device\\HarddiskVolume?\\Windows\\System32\\lxss\\wslhost.exe",
68+
"\\Device\\HarddiskVolume?\\Windows\\System32\\WerFault.exe",
69+
"\\Device\\HarddiskVolume?\\Windows\\Sys?????\\wslconfig.exe"
70+
)
5771
)
5872
'''
5973

rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/14"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -45,6 +46,7 @@ tags = [
4546
"Data Source: Microsoft Defender for Endpoint",
4647
"Data Source: Sysmon",
4748
"Data Source: SentinelOne",
49+
"Data Source: Crowdstrike",
4850
]
4951
timestamp_override = "event.ingested"
5052
type = "eql"

rules/windows/execution_enumeration_via_wmiprvse.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/01/19"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -40,6 +41,7 @@ tags = [
4041
"Data Source: Microsoft Defender for Endpoint",
4142
"Data Source: Sysmon",
4243
"Data Source: SentinelOne",
44+
"Data Source: Crowdstrike",
4345
]
4446
timestamp_override = "event.ingested"
4547
type = "eql"

rules/windows/execution_initial_access_foxmail_exploit.toml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2024/08/29"
3-
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/15"
7+
updated_date = "2024/10/31"
88

99
[rule]
1010
author = ["Elastic"]
@@ -22,7 +22,8 @@ index = [
2222
"logs-windows.sysmon_operational-*",
2323
"logs-sentinel_one_cloud_funnel.*",
2424
"logs-m365_defender.event-*",
25-
"logs-endpoint.events.process-*"
25+
"logs-endpoint.events.process-*",
26+
"logs-crowdstrike.fdr*"
2627
]
2728
language = "eql"
2829
license = "Elastic License v2"
@@ -42,15 +43,15 @@ tags = [
4243
"Data Source: System",
4344
"Data Source: Elastic Endgame",
4445
"Data Source: SentinelOne",
45-
"Data Source: Microsoft Defender for Endpoint"
46+
"Data Source: Microsoft Defender for Endpoint",
47+
"Data Source: Crowdstrike"
4648
]
4749
timestamp_override = "event.ingested"
4850
type = "eql"
4951

5052
query = '''
5153
process where host.os.type == "windows" and event.type == "start" and
5254
process.parent.name : "Foxmail.exe" and process.args : ("?:\\Users\\*\\AppData\\*", "\\\\*")
53-
5455
'''
5556

5657

rules/windows/execution_mofcomp.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/08/23"
3-
integration = ["endpoint", "m365_defender", "system"]
3+
integration = ["endpoint", "m365_defender", "system", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/10"
5+
updated_date = "2024/10/31"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ files to build their own namespaces and classes into the Windows Management Inst
1212
establish persistence using WMI Event Subscription.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.process-*", "logs-m365_defender.event-*", "endgame-*", "logs-system.security-*"]
15+
index = ["logs-endpoint.events.process-*", "logs-m365_defender.event-*", "endgame-*", "logs-system.security-*", "logs-crowdstrike.fdr*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Mofcomp Activity"
@@ -28,6 +28,7 @@ tags = [
2828
"Data Source: Microsoft Defender for Endpoint",
2929
"Data Source: Elastic Endgame",
3030
"Data Source: System",
31+
"Data Source: Crowdstrike",
3132
]
3233
timestamp_override = "event.ingested"
3334
type = "eql"

rules/windows/execution_suspicious_cmd_wmi.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/10/19"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -44,6 +45,7 @@ tags = [
4445
"Data Source: Microsoft Defender for Endpoint",
4546
"Data Source: Sysmon",
4647
"Data Source: SentinelOne",
48+
"Data Source: Crowdstrike",
4749
]
4850
timestamp_override = "event.ingested"
4951
type = "eql"

rules/windows/execution_suspicious_pdf_reader.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/03/30"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/17"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -22,6 +22,7 @@ index = [
2222
"logs-system.security*",
2323
"logs-m365_defender.event-*",
2424
"logs-sentinel_one_cloud_funnel.*",
25+
"logs-crowdstrike.fdr*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -90,6 +91,7 @@ tags = [
9091
"Data Source: Microsoft Defender for Endpoint",
9192
"Data Source: Sysmon",
9293
"Data Source: SentinelOne",
94+
"Data Source: Crowdstrike",
9395
]
9496
timestamp_override = "event.ingested"
9597
type = "eql"

rules/windows/execution_via_compiled_html_file.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2024/10/15"
5+
updated_date = "2024/10/31"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -56,6 +56,7 @@ index = [
5656
"logs-system.security*",
5757
"logs-m365_defender.event-*",
5858
"logs-sentinel_one_cloud_funnel.*",
59+
"logs-crowdstrike.fdr*",
5960
]
6061
language = "eql"
6162
license = "Elastic License v2"
@@ -132,6 +133,7 @@ tags = [
132133
"Data Source: Microsoft Defender for Endpoint",
133134
"Data Source: Sysmon",
134135
"Data Source: SentinelOne",
136+
"Data Source: Crowdstrike",
135137
]
136138
timestamp_override = "event.ingested"
137139
type = "eql"

rules/windows/execution_via_mmc_console_file_unusual_path.toml

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2024/06/19"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system", "crowdstrike"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2024/10/17"
7+
updated_date = "2024/10/31"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,7 +13,7 @@ Identifies attempts to open a Microsoft Management Console File from untrusted p
1313
MSC files for initial access and execution.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
16+
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*", "logs-crowdstrike.fdr*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Microsoft Management Console File from Unusual Path"
@@ -31,14 +31,24 @@ tags = [
3131
"Data Source: SentinelOne",
3232
"Data Source: Microsoft Defender for Endpoint",
3333
"Data Source: System",
34+
"Data Source: Crowdstrike",
3435
]
3536
timestamp_override = "event.ingested"
3637
type = "eql"
3738

3839
query = '''
3940
process where host.os.type == "windows" and event.type == "start" and
40-
process.executable : "?:\\Windows\\System32\\mmc.exe" and process.args : "*.msc" and
41-
not process.args : ("?:\\Windows\\System32\\*.msc", "?:\\Windows\\SysWOW64\\*.msc", "?:\\Program files\\*.msc", "?:\\Program Files (x86)\\*.msc")
41+
process.executable : (
42+
"?:\\Windows\\System32\\mmc.exe",
43+
"\\Device\\HarddiskVolume?\\Windows\\System32\\mmc.exe"
44+
) and
45+
process.args : "*.msc" and
46+
not process.args : (
47+
"?:\\Windows\\System32\\*.msc",
48+
"?:\\Windows\\SysWOW64\\*.msc",
49+
"?:\\Program files\\*.msc",
50+
"?:\\Program Files (x86)\\*.msc"
51+
)
4252
'''
4353

4454

0 commit comments

Comments
 (0)