Retroscan allows detecting indicators of compromise that had not been known when an event was received, but became available later after an update of Kaspersky CyberTrace feeds.
- Sending an event to CyberTrace
An event containing indicators is received at the CyberTrace collector. When received, these indicators may not be present in active feeds.
Example event:
{
"SourceHostName": "45.54.64.52",
"DestinationHostName": "geardox.site",
"Message": "5BA7335AD847E5ED6211FB27094B9855",
"DeviceHostName": "test.domain.ru",
"DeviceAddress": "5.8.16.77",
"FileHash": "E1B85D995DC09DE25603D0B7A67D998015F6C045",
"OldFileHash": "B276263D373A6B56EEAB09673429E1490AEFC5E14738CDF9E1661C36EBD80656",
"RequestUrl": "https://kaspersky.com/"
}
- Saving the event in the CyberTrace database
If integration over TCP is used, CyberTrace uses regular expressions to extract indicators from the event. If integrated via the REST API (using API lookup), indicators are passed directly in the body of the request. If at the moment when an indicator is processed, the feeds do not contain information that allows to classify it, CyberTrace saves it to the retroscan database for subsequent analysis after feeds are updated.
- Running the retroscan task
The retroscan task can be scheduled or run manually. To run a retroscan manually, go to the System → Retroscan page and click Start now.
- Detecting indicators after a feed update
If, during the update process, the feeds deliver indicators that match previously saved events, CyberTrace detects such matches when running the retroscan task.
- Generating alerts based on retroscan results
After the retroscan is completed, CyberTrace generates alerts about the detection of indicators of compromise and sends these alerts to the KUMA collector.
Example alert:
Category=KUMA_Demo_1_Hash_SHA1|MatchedIndicator=E1B85D995DC09DE25603D0B7A67D998015F6C045|MD5=5BA7335AD847E5ED6211FB27094B9855|SHA1=E1B85D995DC09DE25603D0B7A67D998015F6C045|SHA256=B276263D373A6B56EEAB09673429E1490AEFC5E14738CDF9E1661C36EBD80656|file_names=draft_pi.exe|file_size=759296|file_type=PE|first_seen=02.12.2020 05:34|geo=bd, eg, in|last_seen=02.02.2021 11:36|popularity=2|threat=HEUR:Trojan.MSIL.Taskun.gen
- Event processing in KUMA
The event is processed by the [OOTB] CyberTrace normalizer. The user can match the received notification with the original event for subsequent analysis.
- Getting a service alert about the completion of the task
If CyberTrace is configured to send service alerts, CyberTrace sends an alert about the completion of the retroscan task.
Example alert:
Jun 05 16:08:33 alert=KL_ALERT_RetroScanCompleted|iocs_detected=168|iocs_rescanned=1511177|retroscan_report=https://127.0.0.1/retroscan/C4C76046-C2DF-4AED-B430-2E64AEF781FC