ExamGecko
Question list
Search
Search

Question 32 - PCDRA discussion

Report
Export

When creating a BIOC rule, which XQL query can be used?

A.
dataset = xdr_data | filter event_sub_type = PROCESS_START and action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe'
Answers
A.
dataset = xdr_data | filter event_sub_type = PROCESS_START and action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe'
B.
dataset = xdr_data | filter event_type = PROCESS and event_sub_type = PROCESS_START and action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe'
Answers
B.
dataset = xdr_data | filter event_type = PROCESS and event_sub_type = PROCESS_START and action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe'
C.
dataset = xdr_data | filter action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe' | fields action_process_image
Answers
C.
dataset = xdr_data | filter action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe' | fields action_process_image
D.
dataset = xdr_data | filter event_behavior = true event_sub_type = PROCESS_START and action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe'
Answers
D.
dataset = xdr_data | filter event_behavior = true event_sub_type = PROCESS_START and action_process_image_name ~= '.*?\.(?:pdf|docx)\.exe'
Suggested answer: B

Explanation:

A BIOC rule is a custom detection rule that uses the Cortex Query Language (XQL) to define the behavior or actions that indicate a potential threat. A BIOC rule can use the xdr_data and cloud_audit_log datasets and presets for these datasets. A BIOC rule can also use the filter stage, alter stage, and functions without any aggregations in the XQL query. The query must return a single field named action_process_image, which is the process image name of the suspicious process. The query must also include the event_type and event_sub_type fields in the filter stage to specify the type and sub-type of the event that triggers the rule.

Option B is the correct answer because it meets all the requirements for a valid BIOC rule query. It uses the xdr_data dataset, the filter stage, the event_type and event_sub_type fields, and the action_process_image_name field with a regular expression to match any process image name that ends with .pdf.exe or .docx.exe, which are common indicators of malicious files.

Option A is incorrect because it does not include the event_type field in the filter stage, which is mandatory for a BIOC rule query.

Option C is incorrect because it does not include the event_type and event_sub_type fields in the filter stage, and it uses the fields stage, which is not supported for a BIOC rule query. It also returns the action_process_image field instead of the action_process_image_name field, which is the expected output for a BIOC rule query.

Option D is incorrect because it uses the event_behavior field, which is not supported for a BIOC rule query. It also does not include the event_type field in the filter stage, and it uses the event_sub_type field incorrectly. The event_sub_type field should be equal to PROCESS_START, not true.

Working with BIOCs

Cortex Query Language (XQL) Reference

asked 23/09/2024
Herbert Hartwell
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first