Managing user-defined IOC rules
You can use IOC files to search indicators of compromise in the event database and on computers with the Endpoint Agent component. For example, if you have received third-party information about a piece of malware currently spreading, you can:
- Create an IOC file with indicators of compromise for the malware and upload it to the web interface of Kaspersky Anti Targeted Attack Platform.
- Find events corresponding to the criteria of the selected IOC file.
You can view such events, and if you want Kaspersky Anti Targeted Attack Platform to generate alerts for selected events, you can create a TAA (IOA) rule.
- Enable automatic use of the selected IOC file to search indicators of compromise on computers with the Endpoint Agent component.
- If while scanning the computers, the Endpoint Agent component detects indicators of compromise, Kaspersky Anti Targeted Attack Platform generates an alert.
You can find these alerts in the table of alerts by filtering by technology name.
- Configure the schedule for searching for indicators of compromise using IOC files on computers with the Endpoint Agent component.
In and mode, IOC files can have the following types:
- Local—IOC files uploaded to an SCN server. These IOC files are used to search for indicators of compromise on Kaspersky Endpoint Agent hosts connected to the SCN server.
- Global—IOC files uploaded to the PCN server. These IOC files are used to search for indicators of compromise on Kaspersky Endpoint Agent hosts connected to the PCN server and all SCN servers connected to the PCN server.
An IOC file is a text file saved with the .ioc extension. When creating the IOC file, review the list of IOC terms supported by the application that you are using in the Endpoint Agent role. You can view the list of supported IOC terms by downloading the files from the links below.
Kaspersky Endpoint Agent for Windows and Kaspersky Endpoint Security for Windows
Kaspersky Endpoint Security 12 for Linux
Kaspersky Endpoint Security 11.4 for Linux and Kaspersky Endpoint Security for Mac do not support IOC files.
Example of an IOC file for finding a file by its hash
<?xml version="1.0" encoding="us-ascii"?>
<ioc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
id="
unique ID in the UUID format" last-modified="
date of the last modification of the rule in the YYYY-MM-DDT
hh:mm:ss format" xmlns="http://schemas.mandiant.com/2010/ioc">
<short_description>
Rule name</short_description>
<authored_by>
Rule name</authored_by>
<authored_date>
file creation date in the YYYY-MM-DDThh:mm:ss format</authored_date>
<links />
<definition>
<Indicator operator="OR" id="
Unique ID in the UUID format">
<IndicatorItem id="
Unique ID in the UUID format" condition="is">
<Context document="FileItem" search="FileItem/Md5sum" type="mir" />
<Content type="md5">
MD5 hash of the file</Content>
</IndicatorItem>
</Indicator>
</definition>
</ioc>
Each IOC file can contain only one rule. The rule can be of any complexity.
Users with the Senior security officer role can import, delete, download IOC files to their computer, enable or disable the search of indicators of compromise using IOC files, as well as configure the schedule for searching indicators of compromise on computers with the Endpoint Agent component.
Users with the Security officer and Security auditor roles can view the list of IOC files and information about the selected file, and export IOC files to their computer.
Page top