Forum Discussion

tay76's avatar
tay76
Copper Contributor
Aug 25, 2021

[MDE] Add the important feature, Yara rules if possible

Hi,

Refer to this advisory (first link). In addition, you can see that there are Yara rules from GitHub (inside pdf). (2nd link)
All EDR/XDR companies (except Microsoft) already have features and a Yara rule configuration for the incident responders to detect.
 
The method of adding and detecting Yara rules has been in practice across companies for many years.
Would you mind advising on any reason why not adding the important feature, Yara rules?
It would be good if you include the important feature, Yara rules.
If not, would you mind advising on converting from Yara rules to MDE query for querying via advanced threat hunting? Thanks much appreciated. 🙂
 
https://www.csa.gov.sg/singcert/Advisories/ad-2021-007
 
This link is the Yara rule.
https://github.com/Neo23x0/signature-base/blob/master/yara/apt_cobaltstrike.yar
 

7 Replies

  • AdamK419's avatar
    AdamK419
    Copper Contributor

    Following back on on this, 4 years later lol. What's MSFT's timeline to add Yara Rules to the Defender Suite. 

    • Cyberseqwerty's avatar
      Cyberseqwerty
      Copper Contributor

      Add YARA support. GitHub (Owned by MS) holds dozens of repositories containing millions of IoCs that can be integrated with a click of a button to most enterprise SIEMs. Small security departments do not have time to write thousands of KQL queries specific to each IoC. This work was already completed by the original GitHub contributor, don't force customers to reinvent the wheel.

    • Anonymous's avatar
      Anonymous

      also to note it here that the advanced hunting toolkit is only available with more expensive license packages

       

    • tmncri's avatar
      tmncri
      Copper Contributor

      Perhaps a tool to convert from Yara rule format to the format used in Advanced Hunting, would be most useful. 

Resources