Kaspersky Anti Targeted Attack (KATA) Platform

Fields for filtering events

8 November 2023

ID 249086

The fields for filtering events are listed in the table below.

List of fields for filtering events

Field name

Type

Description

hostName

string

Host name.

HostIp

string

IP address of the host.

EventType

string

Event type. Possible values:

  • process — process started.
  • process_terminate — process terminated.
  • module — module loaded.
  • connection — remote connection.
  • applock — prevention rule.
  • blockdocument — document blocked.
  • filechange – file modified.
  • windowsevent — system event log.
  • registry — registry modified.
  • portlisten — port listened.
  • driver — driver loaded.
  • threatdetect — alert.
  • threatprocessingresult — alert processing result.
  • amsiscan — AMSI scan.
  • process_interpretated_file_run — interpreted run of a file.
  • process_console_interactive_input — interactive input of commands on the console.

UserName

string

User name.

OsFamily

string

Family of the operating system.

OsVersion

string

Version of the operating system being used on the host.

Ioa.Rules.Id

string

TAA (IOA) rule ID.

Ioa.Rules.Name

string

Information about the results of file analysis using the Targeted Attack Analyzer technology: name of the TAA (IOA) rule that was used to create the alert.

Ioa.Rules.Techniques

string

MITRE technique

Ioa.Rules.Tactics

string

MITRE tactic

Ioa.Severity

string

Importance level that is assigned to an event generated using this TAA (IOA) rule.

Possible values:

  • Low
  • Medium
  • High

Ioa.Confidence

string

Level of confidence depending on the likelihood of false alarms caused by the rule.

Possible values:

  • Low
  • Medium
  • High

FileCreationTime

integer

File creation time.

DllCreationTime

integer

DLL creation time.

DroppedCreationTime

integer

Creation time of the modified file.

InterpretedFileCreationTime

integer

Creation time of the interpreted file.

FileName

string

File name.

DllName

string

DLL name.

DroppedName

string

Name of the modified file.

BlockedName

string

Name of the blocked file.

InterpretedFileName

string

Name of the interpreted file.

FilePath

If filtering by this field, you must use URL Encode.

string

Path to the directory where the file is located.

DllPath

string

Path to the directory where the DLL is located.

DroppedPath

string

Path to the directory where the modified file is located.

BlockedPath

string

Path to the directory where the blocked file is located.

InterpretedFilePath

string

Path to the directory where the interpreted file is located.

FileFullName

If filtering by this field, you must use URL Encode.

string

Full path to the file. Includes the path to the directory and the file name.

DllFullName

string

Full path to the DLL. Includes the path to the directory and the file name.

DroppedFullName

string

Full path to the modified file. Includes the path to the directory and the file name.

BlockedFullName

string

Full path to the blocked file. Includes the path to the directory and the file name.

DetectedName

string

Full path to the detected file. Includes the path to the directory and the file name.

OriginalFileName

string

Full path to the original file. Includes the path to the directory and the file name.

InterpretedFileFullName

string

Full path to the interpreted file. Includes the path to the directory and the file name.

FileModificationTime

integer

File modification time.

DllModificationTime

integer

DLL modification time.

DroppedModificationTime

integer

Modification time of the modified time.

InterpretedFileModificationTime

integer

Modification time of the interpreted time.

FileSize

integer

File size.

DllSize

integer

DLL size.

DroppedSize

integer

Size of the modified file.

InterpretedFileSize

integer

Size of the interpreted file.

Md5

string

MD5 hash of the file.

DllMd5

string

MD5 hash of the DLL

DroppedMd5

string

MD5 hash of the modified file.

InterpretedMd5

string

MD5 hash of the interpreted file.

DetectedMd5

string

MD5 hash of the detected file.

Sha256

string

SHA256 hash of the file.

DllSha256

string

SHA256 hash of the DLL.

DroppedSha256

string

SHA256 hash of the modified file.

BlockedSha256

string

SHA256 hash of the blocked file.

InterpretedSha256

string

SHA256 hash of the interpreted file.

DetectedSha256

string

SHA256 hash of the detected file.

HijackingPath

string

A malicious DLL placed in a directory on the standard search path to make the operating system load it before the original DLL.

LogonRemoteHost

string

IP address of the host that initiated remote access.

RealUserName

string

Name of the user assigned when the user was registered in the system.

EffectiveUserName

string

User name that was used to log in to the system.

Environment

string

Environment variables.

ProcessType

integer

Process type. Possible values:

  • 1 – exec
  • 2 – fork
  • 3 – vfork
  • 4 – clone

LinuxOperationResult

string

Result of the operation. Possible values:

  • success.
  • failed.

SystemPid.

integer

Process ID.

ParentFileFullName.

If filtering by this field, you must use URL Encode.

string

Path to the parent process file.

ParentMd5

string

MD5 hash of the parent process file.

ParentSha256

string

SHA256 hash of the parent process file.

StartupParameters

string

Start options.

ParentSystemPid

integer

Parent process ID.

Method.

string

HTTP request method.

Direction.

string

Connection direction. Possible values:

  • inbound
  • outbound

LocalIp

string

IP address of the local computer from which the remote connection attempt was made.

LocalPort

integer

Port of the local computer from which the remote connection attempt was made.

RemoteHostName

string

Name of the computer that was the target of the remote connection attempt.

RemoteIp

string

IP address of the computer that was the target of the remote connection attempt.

RemotePort

integer

Port of the computer that was the target of the remote connection attempt.

URI

string

Address of the resource to which the HTTP request was made.

KeyName

string

Path to the registry key.

ValueName

string

Registry value name.

ValueData

string

Registry value data.

RegistryOperationType

integer

Type of the operation with the registry. Possible values:

  • 0 – Registry key created.
  • 1 – Registry key deleted.
  • 2 – Registry modified.
  • 3 – Registry key renamed.

PreviousKeyName

string

Previous path to the registry key.

PreviousValueData

string

Previous name of the registry value.

System.EventID.value

string

Type ID of the security event in the Windows log.

LinuxEventType

string

Event type. Possible values:

  • MemberAddedToGroup — User account created.
  • UserAccountDeleted – User account deleted.
  • GroupCreated – Group created.
  • GroupDeleted – Group modified.
  • MemberAddedToGroup — User account added to a group.
  • UserPasswordChanged – User account password changed.
  • LinuxAuth – Authentication in Linux performed.
  • LinuxSessionStart – Linux session started.
  • LinuxSessionEnd – Linux session ended.
  • ServiceStart – Service started.
  • ChangeAccountExpirationDate – Account expiration date changed.
  • OperatingSystemShuttingDown — Operating system shut down.
  • OperatingSystemStarted – Operating system started.
  • ModifyPromiscuousMode – Promiscuous mode modified.
  • AuditdConfigurationChanged – Audit settings modified.

System.Channel.value

string

Log name.

System.EventRecordID.value

string

Entry ID in the log.

System.Provider.Name.value

string

ID of the system that logged the event.

EventData.Data.TargetDomainName.value

string

Domain name of the remote computer.

EventData.Data.ObjectName.value

string

Name of the object that initiated the event.

EventData.Data.PackageName.value

string

Name of the package that initiated the event.

EventData.Data.ProcessName.value

string

Name of the process that initiated the event.

VerdictName

string

Name of the detected object.

RecordId

integer

ID of the triggered rule.

ProcessingMode

string

Scanning mode. Possible values:

  • Default – default.
  • OnDemand – on demand.
  • OnAccess – on access.
  • OnExecute  – on execution.
  • OnDownload – on download.
  • OnStartup – on startup of applications.
  • OnMail – on sending a message.
  • OnPostpone – postponed scanning.
  • OnDisinfect – on disinfection.
  • OnVulnerability – when scanning for vulnerabilities.
  • OnFirstLaunch – on first launch.
  • OnEngineLoad – on system startup.
  • OnQuarantineRescan – on rescanning objects in the Storage.
  • OnWebRequest – on web request.
  • OnAmsiScan – on AMSI scanning.
  • OnSystemWatcherScan – on analyzing application behavior.

DetectedName

string

Name of the object.

DetectedObjectType

string

Type of the object. Possible values:

  • Unknown.
  • File.
  • LogicalDrive – logical drive.
  • PhysicalDisk – physical disk.
  • SystemMemory – system memory.
  • MemoryProcess – process memory.
  • MemoryModule – memory module.
  • MailMsgRef – References header of the email message.
  • MailMsgMime – MIME attachments.
  • MailMsgBody – body of the email message.
  • MailMsgAttach – attachment of the email message.
  • StartUp – startup objects.
  • Folder – directory.
  • Script – script.
  • Url – URL address.
  • AmsiStream – AMSI scan stream.

ThreatStatus

string

Discovery mode. Possible values:

  • Untreated – object not processed.
  • Untreatable – object cannot be processed.
  • NotFound – object not found.
  • Disinfected – object disinfected.
  • Deleted – object deleted.
  • Quarantined – object moved to quarantine.
  • AddedByUser – object added by the user.
  • Unknown.
  • AddedToExclude – object added to exclusions.
  • Terminated – processing terminated.
  • Clear – object is not infected.
  • FalseAlarm – false alarm.
  • RolledBack – Rolled back to a previous state.
  • IpNotBlocked – IP address not blocked.
  • IpBlocked – IP address blocked.
  • IpCannotBeBlocked — IP address could not be blocked.
  • IpBlockIsNotRequired — IP address blocking not required.

UntreatedReason

string

Object processing status. Possible values:

  • None – no data.
  • NonCurable – object cannot be disinfected.
  • Locked – object locked.
  • ReportOnly – application in Report only mode.
  • NoRights – no rights to perform the action.
  • Canceled – processing canceled.
  • WriteProtect – object is write-protected.
  • TaskStopped – processing task interrupted.
  • Postponed – action postponed.
  • NonOverwritable – object cannot be overwritten.
  • CopyFailed – failed to create a copy of the object.
  • WriteError – data write error.
  • OutOfSpace – Out of disk space.
  • ReadError - data read error.
  • DeviceNotReady – device not ready.
  • ObjectNotFound – object not found.
  • WriteNotSupported – data writing not supported.
  • CannotBackup – failed to create a backup of the object.
  • SystemCriticalObject – object is critical for the system.
  • AlreadyProcessed – object already processed.

InteractiveInputText

string

Interpreter command.

ObjectContent

string

Contents of the script sent to be scanned.

ObjectContentType

integer

Content type of the script. Possible values:

  • 1 – text
  • 2 – binary code

FileOperationType

integer

Type of the file operation. Possible values:

  • 1 – file created
  • 2 – file modified
  • 3 – file renamed
  • 4 – file attributes modified
  • 5 – file deleted
  • 6 – file read

PreviousFileName

string

Path to the directory where the file was previously located.

PreviousFileFullName

string

Full name of the file including the path to the directory where the file was previously located and/or the previous file name.

DroppedFileType

integer

Type of the modified file. Possible values:

  • 0 – unknown
  • 1 – other files
  • 2 – PE image
  • 3 – PE DLL
  • 4 – PE resources
  • 5 – .NET resource file
  • 6 – ELF file

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.