Firewall Rules Set |
Displays a table of set firewall rules and associated data (name,
protocol, computer name, app name, direction, profile, etc.)
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=FirewallSetRule
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("App=(?<App>(.*?))\|", field=FirewallRule, strict=false)
| regex("Action=(?<Action>(.*?))\|", field=FirewallRule, strict=false)
| regex("Active=(?<Active>(.*?))\|", field=FirewallRule, strict=false)
| regex("Profile=(?<Profile>(.*?))\|", field=FirewallRule, strict=false)
| regex("Protocol=(?<Protocol>(.*?))\|", field=FirewallRule, strict=false)
| regex("Dir=(?<Dir>(.*?))\|", field=FirewallRule, strict=false)
| regex("LPort=(?<LPort>(.*?))\|", field=FirewallRule, strict=false)
| regex("RPort=(?<RPort>(.*?))\|", field=FirewallRule, strict=false)
| regex("Desc=(?<Description>(.*?))\|", field=FirewallRule, strict=false)
| regex("Name=(?<Name>(.*?))\|", field=FirewallRule, strict=false)
| regex("(?<FileName>[^\\\]+$)", field=App, strict=false)
| Protocol match {
"1" => Protocol:="ICMP" ;
"6" => Protocol:="TCP" ;
"17" => Protocol:="UDP" ;
"58" => Protocol:="IPv6-ICMP" ;
* => * ;
}
| groupBy([@timestamp, RpcClientProcessId, Name, Protocol, ComputerName, App, Direction, Profile, LPort, RPort, FileName, Direction], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Network Connection Destinations |
Displays a world map of network connection destinations by IP
address.
Hide Query Show Query #event_simpleName=NetworkConnectIP4
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| worldMap(ip=RemoteAddressIP4)
| World Map |
Powershell Activities |
Displays a table of PowerShell activities and their associated
data, then limits results to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=/^(ProcessRollup2|SyntheticProcessRollup2)$/
| ImageFileName=/\\powershell(_ise)?\.exe/i
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=ImageFileName, strict=false)
| groupBy([@timestamp, ComputerName, UserSid, ParentProcessId, RawProcessId, TargetProcessId, CommandLine, aid], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Cloud Instance Info |
Displays a table of cloud instance information then limits results
to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=InstanceMetadata
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| kvParse(field=InstanceMetadata, separator=":")
| groupBy([aid, ComputerName, privateIp, accountId, instanceId, instanceType, imageId, availabilityZone], limit=1000)
| drop([_count])
| Table |
Parent to Child Process |
Displays a flow chart of the parent file to child file process.
Hide Query Show Query #event_simpleName=ProcessRollup2
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| sankey(source=ParentBaseFileName, target=ImageFileName)
| Sankey |
Network Connections |
Displays a table of network connections and their details,
including timestamp, IP address, port data, etc. and limits
results to the first 1000 entries.
Hide Query Show Query #cid = ?cid
| #event_simpleName=/^(ProcessRollup2|NetworkConnectIP4)$/
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| #event_simpleName match {
ProcessRollup2 => pid:=TargetProcessId ;
NetworkConnectIP4 => pid:=ContextProcessId ;
* => * ;
}
| groupBy([aid, pid], function=
[
{ #event_simpleName=ProcessRollup2 | selectLast([@timestamp, ImageFileName, CommandLine]) },
{ #event_simpleName=NetworkConnectIP4 | groupBy([RemoteAddressIP4, RemotePort, LocalPort], limit=max) | drop(_count) }
], limit=max)
| RemoteAddressIP4=*
| ImageFileName= /(\/|\\)(?<FileName>\w*\.?\w*)$/i
| groupBy([@timestamp, RemoteAddressIP4, LocalPort, RemotePort, pid, FileName, CommandLine], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Command History |
Displays a table of a user's command history then limits the
results to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=CommandHistory
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| replace("¶", with="\n", field=CommandHistory)
| table([@timestamp, ApplicationName, CommandCount, CommandHistory], limit=1000)
| sort(@timestamp, limit=1000)
| Table |
Listening Ports |
Displays a table of ports that are listening and associated data,
then limits results to the first 200 entries.
Hide Query Show Query #event_simpleName=ProcessRollup2 OR #event_simpleName=NetworkListenIP4
| aid=?aid
| test(?aid != "*")
| #event_simpleName match {
ProcessRollup2 => pid := TargetProcessId;
NetworkListenIP4 => pid := ContextProcessId;
}
// Group by the agent ID and for each group, group by the 'pid' field.
| groupBy("aid", function=[
{ groupBy("pid", function=[
{ #event_simpleName="ProcessRollup2" | selectLast([ImageFileName]) },
{ #event_simpleName="NetworkListenIP4" | table([LocalAddressIP4, LocalPort]) }
], limit=max)
}
], limit=max)
| match(field=aid, file="fdr_aidmaster.csv", column=aid, include=ComputerName, strict=true)
| LocalAddressIP4=* AND LocalPort=* AND ImageFileName=*
| table([aid, ComputerName, ImageFileName, LocalAddressIP4, LocalPort], limit=200)
| Table |
Uniqe ASEP Values Updated |
Displays a list of unique ASEP values that have been updated.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=AsepValueUpdate
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| count(RegValueName, distinct=true)
| Single Value |
Unique Browser-Injected Threads |
Displays the number of unique browser-injected threads by computer
name.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=BrowserInjectedThread
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| count(TargetThreadId, distinct=true)
| Single Value |
Top DNS Requests |
Displays a list of top DNS requests by domain name.
Hide Query Show Query #event_simpleName=DnsRequest
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| top(DomainName)
| rename(_count, as="#requests")
| Table |
Falcon Links |
Displays a table of real time response data including user search,
zero trust assessment data, etc. then limits the results to the
first 10 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| $"crowdstrike/fltr-core:zUrlFalconAid"()
| head(1)
| rename(field="RTR", as="Real Time Response")
| replace("\[RTR\]", with="\[Real Time Response\]", field="Real Time Response")
| table(["Real Time Response", "User Search", "Zero Trust Assessment", "Spotlight", "Host Management", "Host Search"], limit=10)
| Table |
Scripts Written |
Displays a table of scripts written and limits results to the
first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=NewScriptWritten
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=TargetFileName, strict=false)
| groupBy([@timestamp, ContextProcessId, FileName, LocalAddressIP4, TargetFileName, size], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Manual Registry Additions |
Displays a list of manual registry additions and groups them by
user ID, file name, etc. then sorts them by time stamp and limits
to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2
| ImageFileName=/reg.exe/i
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=TargetFileName, strict=false)
| groupBy([@timestamp, UserSid, FileName, CommandLine, ParentBaseFileName], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Unique ASEP Keys Updated |
Displays a list of ASEP keys that have been updated.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=AsepKeyUpdate
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| count(RegObjectName, distinct=true)
| Single Value |
Host Info |
Displays a table of host information including city, country,
product type, version, etc.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #kind=Secondary
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| $"crowdstrike/fltr-core:zUrlFalconAid"()
| ipLocation(field=aip, as=aip)
| groupBy(aid, function=collect([ComputerName, RTR, aip, aip.city, aip.country, ProductType, Version, BiosManufacturer, BiosVersion, ChassisManufacturer, SystemManufacturer, SystemProductName, MachineDomain, AgentVersion, aid, #cid], limit=100), limit=1000)
| drop(_count)
| Table |
Java Injected Threads |
Displays a list of Java injected threads.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=JavaInjectedThread
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| count(TargetThreadId, distinct=true)
| Single Value |
Files Written to Removable Media |
Displays files that have been written to a removable media source.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=*FileWritten*
| IsOnRemovableDisk=1
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=TargetFileName, strict=false)
| groupBy([@timestamp, ContextProcessId, FileName, LocalAddressIP4, TargetFileName, Size], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Event List |
User Logons |
Displays a table of user logons by type with additional data, then
limits results to the first 200 entries.
Hide Query Show Query #event_simpleName=UserLogon
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| case { LogonType="2" | Logon_Type:="Interactive"; LogonType="3" | Logon_Type:="Network";
LogonType="4" | Logon_Type:="Batch"; LogonType="5" | Logon_Type:="Service";
LogonType="6" | Logon_Type:="Proxy"; LogonType="7" | Logon_Type:="Unlock";
LogonType="8" | Logon_Type:="Network clear text"; LogonType="9" | Logon_Type:="New Credentials";
LogonType="10" | Logon_Type:="RDP"; LogonType="11" | Logon_Type:="Cached Credentials";
LogonType="12" | Logon_Type:="Auditing"; LogonType="13" | Logon_Type:="Unlock Workstation";*}
| table([@timestamp, UserName, LogonDomain, Logon_Type, UserIsAdmin], limit=200)
| Table |
Schedule Tasks |
Displays a table of scheduled tasks with associated data
(username, task name, command data, and arguments).
Hide Query Show Query #event_simpleName=ScheduledTaskRegistered
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| table([UserName, TaskName, TaskExecCommand, TaskExecArguments])
| Table |
Network Connections Count |
Displays a list of IP4 network connections.
Hide Query Show Query #event_simpleName=NetworkConnectIP4
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| !regex("^(10|172\.16|192\.168)\.", field=RemoteAddressIP4)
| ipLocation(field=RemoteAddressIP4, as=RemoteAddressIP4)
| top([RemoteAddressIP4, RemoteAddressIP4.country])
| rename(_count, as="#connections")
| Table |
Local and External IPs |
Displays a table of local and external IP addresses and limits
results to the first 100 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=/^(NetworkConnectIP4|NetworkReceiveAcceptIP4|LocalIpAddressIP4)$/
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| LocalAddressIP4=*
| groupBy(PhysicalAddress, function=[collect([LocalAddressIP4, aip, InterfaceAlias], limit=100)], limit=max)
| Table |
Detections |
Displays a list of API event detections.
Hide Query Show Query ExternalApiType=Event_DetectionSummaryEvent
| test(?aid != "*")
| AgentIdString = ?aid AND CustomerIdString = ?cid
| groupby([UserName, FileName, DetectName, DetectDescription, SeverityName], function=[count(as=DetectionCount)], limit=max)
| Table |
Admin Tools |
Displays a table of admin tools associated with an event and
related data, then limits results to the first 1000 entries.
Hide Query Show Query #cid = ?cid
| #event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2
| CommandLine=* ImageFileName=*
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=ImageFileName, strict=false)
| match(file="crowdstrike/fltr-core/recon_apps.csv", field=FileName, include=FileName, ignoreCase=true, strict=true)
| groupBy([@timestamp, UserSid, FileName, TargetProcessId, CommandLine, aid], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Packed Executable Written |
Displays a list of packed executables that have been written.
Hide Query Show Query #event_simpleName=PackedExecutableWritten
| test(?aid != "*")
| #cid = ?cid AND aid=?aid
| count()
| Single Value |
BIOS Information |
Retrieves detailed BIOS information, then summarizes based on
computer name, system manufacturer, release date, BIOS version,
etc.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=/^(AgentOnline|FirmwareImageAnalyzed|FirmwareImageCheck)$/
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| groupBy([aid, ComputerName, SystemManufacturer, BiosReleaseDate, BiosVersion, SHA256HashData], limit=1000)
| drop([_count])
| Table |
Running Services (started during selected time range) |
Displays a table of services that started running during a
selected time range, then limits results to the first 1000
entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=ServiceStarted
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=ImageFileName, strict=false)
| groupBy([@timestamp, ComputerName, UserName, TargetProcessId, ServiceDisplayName, CommandLine, SHA256HashData, aid], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Processes Executions |
Displays a list of events and the processes executed.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| (#event_simpleName=ProcessRollup2 OR #event_simpleName=SyntheticProcessRollup2)
| ImageFileName=/(\/|\\)(?<FileName>\w*\.?\w*)$/i
| rename(field=ImageFileName, as=OriginalFileName)
| rename(field=CommandLine, as=OriginalCommandLine)
| tail(1000)
| $"crowdstrike/fltr-core:zUrlFalconPid"()
| groupBy([@timestamp, ComputerName, FileName, OriginalCommandLine, TargetProcessId, MD5HashData, ParentBaseFileName, ParentProcessId, aid], function=collect(["Process Explorer"]), limit=1000)
| sort(@timestamp, limit=1000)
| Table |
Injected Threads From Unsigned Modules |
Displays a list of injected threads from unsigned modules.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=InjectedThreadFromUnsignedModule
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| count(TargetThreadId, distinct=true)
| Single Value |
Unique Executables Written |
Displays a list of unique executables written using SHA256 hash
data.
Hide Query Show Query #event_simpleName=PeFileWritten
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| count(SHA256HashData, distinct=true)
| Single Value |
Executable Activities |
Displays a table of executable activities (deleted, renamed,
added) and limits results to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=/^(ExecutableDeleted|NewExecutableRenamed|NewExecutableWritten|PeFileWritten)$/
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| regex("(?<FileName>[^/\\\]+$)", field=TargetFileName, strict=false)
| tail(200)
| #event_simpleName match {
"ExecutableDeleted" => Action:="Deleted" ;
"NewExecutableRenamed" => Action:="Renamed" ;
"NewExecutableWritten" => Action:="Added" ;
"PeFileWritten" => Action:="Added" ;
}
| tail(1000)
| groupBy([@timestamp, ContextProcessId, FileName, LocalAddressIP4, TargetFileName, Action], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Detections Links |
Displays a table of detection links and additional relevant data,
then limits results to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName!=* OR #streamingApiEvent=Event_DetectionSummaryEvent
| ExternalApiType=Event_DetectionSummaryEvent
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| format("[Detection Link](%s)", field=["FalconHostLink"], as="DetectionLink")
| groupBy([@timestamp, DetectId], function=[collect([DetectionLink, FileName, DetectName, Severity, SeverityName, ComputerName, UserName, MD5String, SHA256String], limit=100)], limit=1000)
| drop(DetectId)
| sort(@timestamp, limit=1000)
| Table |
Unique DLL Injections |
Displays a list of unique DLL injections.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=DLLInjections
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| count(TargetThreadId, distinct=true)
| Single Value |
Rar / Zip File Written |
Displays a table of RAR/zip files written and associated data then
limits results to the first 1000 entries.
Hide Query Show Query wildcard(field=#cid, pattern=?cid, ignoreCase=true)
| #event_simpleName=/^(RarFileWritten|SevenZipFileWritten|ZipFileWritten)$/
| $"crowdstrike/fltr-core:zComputerName"()
| wildcard(field=ComputerName, pattern=?ComputerName, ignoreCase=true)
| wildcard(field=aid, pattern=?aid, ignoreCase=true)
| tail(1000)
| regex("(?<FileName>[^/\\\]+$)", field=TargetFileName, strict=false)
| groupBy([@timestamp, ContextProcessId, FileName, LocalAddressIP4, TargetFileName, size], limit=1000)
| drop(_count)
| sort(@timestamp, limit=1000)
| Table |
Host Information |
Displays a table of host information, including computer name,
agent version, etc.)
Hide Query Show Query #event_simpleName=AgentOnline
| test(?aid != "*")
| aid=?aid AND #cid = ?cid
| ipLocation(field=aip, as=aip)
| groupby([ComputerName, AgentVersion, aip, aip.country, aip.city, BiosManufacturer, BiosVersion, ChassisManufacturer, SystemManufacturer, SystemProductName, aid], limit=max)
| drop(_count)
| Table |