This section explains how to use the web interface to add and configure event sources with custom regular expressions.
Kaspersky CyberTrace sends information about a detection to a SIEM as a single event. To reduce dwell time, all context information that is required for triage and investigation should be included into this event. This can be accomplished by configuring event sources and custom regular expressions.
Repeat the steps below for every unique source of events that you have.
To configure an event source with custom regular expressions:
URL
, IP
, MD5
and other indicator types), add regular expressions of CONTEXT
type. Regular expressions of CONTEXT
type must match any information that will be relevant for the response, such as event identifiers, request identifiers, and time stamps. This context information will also help to search for raw events in the SIEM software, if required.CONTEXT
regular expressions to the Detection events format field. To do so, specify the names of all regular expressions in the detection events format by using the %RegexpName%
pattern.Example
The event source for this example is a McAfee Web Gateway source.
The event source with custom regular expressions is configured as follows:
This event source sends logs through the SIEM software, so adding this event source by IP is not possible because all such event sources will have the IP address of the SIEM software. Instead, specify a regular expression that will identify this event source based on the data contained in the events. For example, the expression can match a device name or a device version that are contained in the events. Note that If your event source sends the events directly to Kaspersky CyberTrace, specify such source by its IP instead.
Creating a new event source
Only those events that matched the regular expression specified in the previous step will be displayed.
For example, events with the following data were received:
McAfeeWG|time_stamp=[01/Jan/2015:02:12:31 +0800]|auth_user=jsmith|src_ip=10.10.69.1|server_ip=192.0.2.1|host=www.example.com|url_port=80|status_code=301|bytes_from_client=279|bytes_to_client=1149|categories=Business, Software/Hardware|rep_level=Minimal Risk|method=GET|url=http://www.example.com/|media_type=text/html|application_name=|user_agent=Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0)|block_res=0|block_reason=|virus_name=|hash=|filename=|filesize=753|
Collecting events
CONTEXT
type.To match the user name contained in the events, add an expression named RE_USERNAME
. Specify the following value for the expression: auth_user\=(.*?)(?:\|)
To match the source IP address, add an expression named RE_SRCIP
. Specify the following value for the expression: src_ip\=(.*?)(?:\|)
To match the URL, add an expression named RE_URL
. Specify the following value for the expression: url\=(.*?)(?:\|)
To match the HTTP status code, add an expression named RE_HTTPCODE
. Specify the following value for the expression: status_code=(\d+)
Specifying custom regular expressions
eventName=%Category% matchedIndicator=%MatchedIndicator% url=%RE_URL% src=%RE_SRCIP% ip=%RE_IP% http_code=%RE_HTTPCODE% usrName=%RE_USERNAME% %RecordContext%
Specifying the output format of events
After the steps above are done, the detected events will contain the context fields. For example, an event from Kaspersky CyberTrace can have the following information:
device=McAfee eventName=KL_IP_Reputation matchedIndicator=192.0.2.1 url=- src=10.10.69.1 ip=192.0.2.1 http_code=301 category=test usrName=jsmith first_seen=01.01.2017 00:00 ip=192.0.2.1 ip_geo=ru last_seen=20.11.2019 10:02 popularity=1 threat_score=75
Page top