Configuring event enrichment and retroscan

Integration of KUMA with Kaspersky CyberTrace (hereinafter referred to as CyberTrace) version 5.0 and later allows enriching events with information about indicators of compromise (IoC) and retrospectively scanning events. Retroscan allows detecting indicators that had not been detected at the time of initial enrichment, but appeared later in updated CyberTrace feeds. Retroscan can be useful in the following cases:

To configure data enrichment and retroscan, follow these steps:

  1. Perform initial configuration in KUMA:
    1. Configure CyberTrace integration.
    2. Create a collector to receive events that you want to enrich with CyberTrace data.
      • To configure the enrichment of events with data from CyberTrace select a connector of the http type as the transport. You can choose any normalizer (for example, json) with the mapping of the following fields: SourceHostName, DestinationHostName, Message, DeviceHostName, DeviceAddress, FileHash, OldFileHash, RequestUrl.
      • To configure the receipt of events from CyberTrace, you need to select a connector of the tcp type as the transport, and [OOTB] CyberTrace as the normalizer.
    3. Create event enrichment rules in KUMA.
      • We recommend selecting cybertrace-http as the source kind.
      • Use the Major version of CyberTrace toggle switch to specify ≥ 5.0 as the CyberTrace version.
      • In the Key fields drop-down list, select the following normalizer fields: SourceHostName, DestinationHostName, Message, DeviceHostName, DeviceAddress, FileHash, OldFileHash, RequestUrl.
  2. Configure retroscan in the CyberTrace web interface:
    1. On the Settings → General page, enable API lookup to save detected indicators and collect statistics a public API request is used.
    2. On the Settings → Retroscan page, enable retroscan, then select the Regular expressions and enable only those sources and regular expressions that you want to use for retroscan.
    3. On the Settings → General page, in the Detection alerts section, specify the IP address and port that CyberTrace will use to send alerts about the detection of indicators of compromise.
    4. On the Settings → General page, in the Service alerts section, configure CyberTrace service notifications (for example, notifications about the retroscan task finishing or license change) by specifying the IP address of the collector and the port of the KUMA TCP connector.

    You can get detailed information on configuring retroscan from the Kaspersky CyberTrace Administrator Guide.

Event processing stages during retroscan

Page top