- Notifications
You must be signed in to change notification settings - Fork 603
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 4 #5019
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,8 @@ | ||
[metadata] | ||
creation_date = "2023/05/05" | ||
integration = ["endpoint"] | ||
integration = ["endpoint", "sentinel_one_cloud_funnel"] | ||
maturity = "production" | ||
updated_date = "2025/05/05" | ||
updated_date = "2025/08/26" | ||
| ||
[rule] | ||
author = ["Elastic"] | ||
| @@ -11,7 +11,7 @@ Identifies suspicious instances of communications apps, both unsigned and rename | |
conceal malicious activity, bypass security features such as allowlists, or trick users into executing malware. | ||
""" | ||
from = "now-9m" | ||
index = ["logs-endpoint.events.process-*"] | ||
index = ["logs-endpoint.events.process-*", "logs-sentinel_one_cloud_funnel.*", "endgame-*"] | ||
language = "eql" | ||
license = "Elastic License v2" | ||
name = "Potential Masquerading as Communication Apps" | ||
| @@ -25,6 +25,8 @@ tags = [ | |
"Tactic: Defense Evasion", | ||
"Data Source: Elastic Defend", | ||
"Resources: Investigation Guide", | ||
"Data Source: SentinelOne", | ||
"Data Source: Elastic Endgame", | ||
] | ||
timestamp_override = "event.ingested" | ||
type = "eql" | ||
| @@ -35,40 +37,40 @@ process where host.os.type == "windows" and | |
( | ||
/* Slack */ | ||
(process.name : "slack.exe" and not | ||
(process.code_signature.subject_name in ( | ||
(process.code_signature.subject_name : ( | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. FYI for the reviewers, changing this to be case insensitive as S1 populates this field with all uppercase | ||
"Slack Technologies, Inc.", | ||
"Slack Technologies, LLC" | ||
) and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* WebEx */ | ||
(process.name : "WebexHost.exe" and not | ||
(process.code_signature.subject_name in ("Cisco WebEx LLC", "Cisco Systems, Inc.") and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : ("Cisco WebEx LLC", "Cisco Systems, Inc.") and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* Teams */ | ||
(process.name : "Teams.exe" and not | ||
(process.code_signature.subject_name == "Microsoft Corporation" and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* Discord */ | ||
(process.name : "Discord.exe" and not | ||
(process.code_signature.subject_name == "Discord Inc." and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Discord Inc." and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* RocketChat */ | ||
(process.name : "Rocket.Chat.exe" and not | ||
(process.code_signature.subject_name == "Rocket.Chat Technologies Corp." and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Rocket.Chat Technologies Corp." and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* Mattermost */ | ||
(process.name : "Mattermost.exe" and not | ||
(process.code_signature.subject_name == "Mattermost, Inc." and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Mattermost, Inc." and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* WhatsApp */ | ||
(process.name : "WhatsApp.exe" and not | ||
(process.code_signature.subject_name in ( | ||
(process.code_signature.subject_name : ( | ||
"WhatsApp LLC", | ||
"WhatsApp, Inc", | ||
"24803D75-212C-471A-BC57-9EF86AB91435" | ||
| @@ -77,17 +79,17 @@ process where host.os.type == "windows" and | |
| ||
/* Zoom */ | ||
(process.name : "Zoom.exe" and not | ||
(process.code_signature.subject_name == "Zoom Video Communications, Inc." and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Zoom Video Communications, Inc." and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* Outlook */ | ||
(process.name : "outlook.exe" and not | ||
(process.code_signature.subject_name == "Microsoft Corporation" and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true) | ||
) or | ||
| ||
/* Thunderbird */ | ||
(process.name : "thunderbird.exe" and not | ||
(process.code_signature.subject_name == "Mozilla Corporation" and process.code_signature.trusted == true) | ||
(process.code_signature.subject_name : "Mozilla Corporation" and process.code_signature.trusted == true) | ||
) | ||
) | ||
''' | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,8 @@ | ||
[metadata] | ||
creation_date = "2020/09/01" | ||
integration = ["endpoint", "windows", "m365_defender"] | ||
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"] | ||
maturity = "production" | ||
updated_date = "2025/05/05" | ||
updated_date = "2025/08/26" | ||
| ||
[transform] | ||
[[transform.osquery]] | ||
| @@ -43,6 +43,7 @@ index = [ | |
"logs-windows.sysmon_operational-*", | ||
"endgame-*", | ||
"logs-m365_defender.event-*", | ||
"logs-crowdstrike.fdr*", | ||
] | ||
language = "eql" | ||
license = "Elastic License v2" | ||
| @@ -110,6 +111,7 @@ tags = [ | |
"Data Source: Elastic Defend", | ||
"Data Source: Sysmon", | ||
"Data Source: Microsoft Defender for Endpoint", | ||
"Data Source: Crowdstrike", | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. FYI - this rule scope will be expanded by this PR https://github.com/elastic/detection-rules/pull/5001/files#diff-144ed12542ec43b6381b1bb6ec737eae308465ef0f213f9444e87f187bfa0b7dR121 (no action required) | ||
] | ||
timestamp_override = "event.ingested" | ||
type = "eql" | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@w0rk3r CS reg event is
\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet*\\Control\\Lsa\\RunAsPPL
why using wildcard here ?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To simplify the logic, the performance should be ok as I added the
registry.value
condition