You can make any changes to custom Sigma rules. You can only add or remove exclusions and change the state of Sigma rules that are supplied by Kaspersky Lab.
To edit a Sigma rule:
The Modifying the collection rules window opens.
The Changing the Sigma rule window opens.
The content of Sigma rules supplied with the application databases is unavailable to the user. This is because the triggering conditions for these rules are Kaspersky's intellectual property and cannot be disclosed.
In the editor for editing a Sigma rule supplied with the application databases, you can only add exclusions from the rule by specifying exclusion settings in the detection
section.
The exclusion template is defined as follows:
detection:
exclude1:
- ...
condition: not 1 of exclude*
This template assumes that exclusions are specified using exclude*
attributes, and the rule triggering condition assumes that the conditions hidden from the user are satisfied and that none of the specified exclusions are a match.
For example:
detection:
exclude1:
Image|endswith:
- '\chrome.exe'
- '\tor.exe'
exclude2:
QueryName|endswith: 'api.parsec.app'
condition: not 1 of exclude*
The table contains basic information about the attributes and sections of a Sigma rule, which are interpreted by Kaspersky Endpoint Agent. For more detailed information, follow this link.
Attribute values are case-sensitive. For example, Kaspersky Endpoint Agent treats the names of the executable files AnyDesk.exe and anyDesk.exe
as different.
Sigma rule structure
Attribute / Section |
Required |
Description |
||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Yes |
The rule name, which indicates what it detects. The maximum length is 256 characters. For example:
|
||||||||||||||||||||||||||||
|
No |
The rule's globally unique identifier. For example:
|
||||||||||||||||||||||||||||
|
No |
Rule status. Possible values: For example:
|
||||||||||||||||||||||||||||
|
No |
A description of the rule and the malicious activity it can detect. The maximum length is 65,535 characters. For example:
|
||||||||||||||||||||||||||||
|
No |
License ID according to the SPDX ID specification. The rule is published under the terms of the specified license type. |
||||||||||||||||||||||||||||
|
No |
Any specifier that indicates the author of the rule. For example, first name and last name, nickname, social network ID. |
||||||||||||||||||||||||||||
|
No |
Link to the source the rule was taken from. For example, a blog article or white paper. |
||||||||||||||||||||||||||||
|
No |
Date when the rule was created in YYYY/MM/DD format. |
||||||||||||||||||||||||||||
|
No |
Date in YYYY/MM/DD format when one of the following rule attributes was changed: |
||||||||||||||||||||||||||||
|
No |
Tag for categorizing the rule. Read more at this link. |
||||||||||||||||||||||||||||
|
Yes |
In this section, you can define the source of events that the application will search for anomalies. The main attributes of this section are Event sources that Kaspersky Endpoint Agent supports Event sources supported by Kaspersky Endpoint Agent
Read more at this link. |
||||||||||||||||||||||||||||
|
No |
Defines the category of products whose event logs the application searches for anomalies. For example: firewall, internet, anti-virus, or generic.
|
||||||||||||||||||||||||||||
|
No |
Defines the software product or operating system whose event logs the application searches for anomalies. For example:
|
||||||||||||||||||||||||||||
|
No |
Defines a service whose event logs the application searches for anomalies. For example:
|
||||||||||||||||||||||||||||
|
No |
Description of the specifics of the source of event logs that application searches for anomalies. |
||||||||||||||||||||||||||||
|
Yes |
This section contains one or more criteria for searching for anomalies in event logs and a rule triggering condition. Lists, dictionaries, or a combination of them can be used as search criteria. Kaspersky Endpoint Agent does not support |
||||||||||||||||||||||||||||
|
No |
A list of the values of any parameter from the event log, combined by a logical OR. For example:
In accordance with the condition, the following matches will be searched: |
||||||||||||||||||||||||||||
|
No |
event log parameter - value pairs. They are connected by a logical AND. For example:
In accordance with the condition, the following matches will be searched: EventLog='Security' AND Event ID=517. |
||||||||||||||||||||||||||||
|
No |
A list consisting of event log settings values and dictionaries. For example:
In accordance with the condition, the following matches will be searched: EventLog='Security' AND (Event ID=517 OR Event ID=1102) |
||||||||||||||||||||||||||||
|
Yes |
Rule triggering condition. For example:
|
||||||||||||||||||||||||||||
|
No |
Lines from the event log that may be of interest to an analyst for subsequent analysis of the event. |
||||||||||||||||||||||||||||
|
No |
List of known scenarios that may incorrectly trigger the rule. For example:
|
||||||||||||||||||||||||||||
|
No |
An indicator of the severity of anomalies that can be found using the rule. Possible values: |
See also |