Kaspersky Anti Targeted Attack Platform

Searching events in source code mode

To define event search conditions in source code mode:

  1. In the application web interface window, select the Threat Hunting section, Source code tab.

    This opens a form containing the field for entering event search conditions in source code mode.

  2. Enter the event search conditions using criteria, operators, logical operators OR and AND, and parentheses to group conditions.

    A search condition must conform to the following syntax: <criterion> <operator> <criterion value>.

    Example:

    EventType == 'filechange' AND

    (

    (

    FileName == '*example*' OR

    DllName == '*example*' OR

    DroppedName == '*example*' OR

    BlockedName == '*example*' OR

    InterpretedFileName == '*example*' OR

    InterpretedFiles.FileName == '*example*' OR

    TargetName == '*example*' OR

    HandleSourceName == '*example*' OR

    HandleTargetName == '*example*'

    ) OR

    UserName == '*example*'

    )

     

    You can use the autocomplete feature. To do so, place the cursor in the query line and press Ctrl+Space.

  3. If you want to search events that occurred during a specific period, click the Any time button and select one of the following event search periods:
    • Any time if you want the table to display events found as far back as the records go.
    • Last hour if you want the table to display events that were found during the last hour.
    • Last day if you want the table to display events found during the last day.
    • Custom range if you want the table to display events found during the period you specify.
  4. If you selected Custom range:
    1. In the calendar that opens, specify the start and end dates of the event display range.
    2. Click Apply.

    The calendar closes.

  5. Click Search.

    The table of events that satisfy the search criteria is displayed.

    If you are using the

    and mode, found events are grouped in tiers: Server – Tenant names – Server names.

  6. Click the name of the server for which you want to view events.

    The host table of the selected server is displayed. Event grouping levels are displayed above the table.

See also

Events database threat hunting

Searching for events in builder mode

Conversion to a query to search events in source code mode

Event search criteria

Operators

Sorting events in the table

Changing the event search conditions

Searching for events by processing results in EPP applications

Searching for events using conditions specified in an IOC or YAML file

Creating a TAA (IOA) rule based on event search conditions