-
Notifications
You must be signed in to change notification settings - Fork 511
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] 3rd Party EDR - Add Crowdstrike FDR support - 3 #4222
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just two questions. For the last 3 PRs, would it make sense changing the operators to be more efficient as well?
So changing :
to like
etc.
] | ||
timestamp_override = "event.ingested" | ||
type = "eql" | ||
|
||
query = ''' | ||
process where host.os.type == "windows" and event.type == "start" and | ||
process.executable : "C:\\*Program*Files*\\*.exe" and | ||
process.executable : ( | ||
"C:\\*Program*Files*\\*.exe", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Any reason why there are wildcards?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To match directories that masquerade as Program Files, not the original
@@ -56,6 +61,18 @@ process where host.os.type == "windows" and event.type == "start" and | |||
"?:\\Windows\\Downloaded Program Files\\*.exe", | |||
"?:\\Windows\\Temp\\.opera\\????????????\\CProgram?FilesOpera*\\*.exe", | |||
"?:\\Windows\\Temp\\.opera\\????????????\\CProgram?Files?(x86)Opera*\\*.exe" | |||
) and | |||
not ( | |||
event.dataset == "crowdstrike.fdr" and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just curious, what is this about?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To not execute these wildcards unless the dataset is Crowdstrike, so we don't make the query more expensive by adding it
As we are dealing with multiple vendors and data sources, assuming they share a pattern when populating this data is very risky (Some may be lowercase in specific events, others, all uppercase, which can make the rules to not work). We can take a look at that in the future, but for now we don't have enough data to work on that |
Removed changes from: - rules/windows/defense_evasion_masquerading_trusted_directory.toml - rules/windows/defense_evasion_wsl_child_process.toml - rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml - rules/windows/execution_enumeration_via_wmiprvse.toml - rules/windows/execution_initial_access_foxmail_exploit.toml - rules/windows/execution_suspicious_cmd_wmi.toml - rules/windows/execution_suspicious_pdf_reader.toml - rules/windows/execution_via_compiled_html_file.toml - rules/windows/execution_via_mmc_console_file_unusual_path.toml (selectively cherry picked from commit 2b6116e)
Removed changes from: - rules/windows/defense_evasion_masquerading_trusted_directory.toml - rules/windows/defense_evasion_wsl_child_process.toml - rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml - rules/windows/execution_enumeration_via_wmiprvse.toml - rules/windows/execution_initial_access_foxmail_exploit.toml - rules/windows/execution_suspicious_cmd_wmi.toml - rules/windows/execution_suspicious_pdf_reader.toml - rules/windows/execution_via_compiled_html_file.toml - rules/windows/execution_via_mmc_console_file_unusual_path.toml (selectively cherry picked from commit 2b6116e)
Removed changes from: - rules/windows/defense_evasion_masquerading_trusted_directory.toml - rules/windows/defense_evasion_wsl_child_process.toml - rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml - rules/windows/execution_enumeration_via_wmiprvse.toml - rules/windows/execution_initial_access_foxmail_exploit.toml - rules/windows/execution_suspicious_cmd_wmi.toml - rules/windows/execution_suspicious_pdf_reader.toml - rules/windows/execution_via_compiled_html_file.toml - rules/windows/execution_via_mmc_console_file_unusual_path.toml (selectively cherry picked from commit 2b6116e)
Removed changes from: - rules/windows/defense_evasion_masquerading_trusted_directory.toml - rules/windows/defense_evasion_wsl_child_process.toml - rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml - rules/windows/execution_enumeration_via_wmiprvse.toml - rules/windows/execution_initial_access_foxmail_exploit.toml - rules/windows/execution_suspicious_cmd_wmi.toml - rules/windows/execution_suspicious_pdf_reader.toml - rules/windows/execution_via_compiled_html_file.toml - rules/windows/execution_via_mmc_console_file_unusual_path.toml (selectively cherry picked from commit 2b6116e)
(cherry picked from commit 2b6116e)
(cherry picked from commit 2b6116e)
Issues
Part of https://github.com/elastic/ia-trade-team/issues/242
Summary
Adjust simple (no sequence) rules to introduce support for Crowdstrike FDR. While full logic validation wasn't possible due to the lack of a test environment, the field population for each category was verified to ensure the data was correctly structured and populated as needed.
EDR field compatibility matrix may be of help to review, although the data provided by FDR is not consistent across event categories, and not even between event actions.