Incident parameters

For EDR Threat Response, you need to specify basic request parameters, for example, in JSON format:

To configure EDR Threat Response, you need to specify task settings in JSON format in the "KLINCDT_BODY": json.dumps(data) parameter. As a result, the application creates the [Response][KUMA] <task type> - <Date> <Time> - <ID> in the Kaspersky Security Center console.

Get filegetFile

Get file task settings

Parameter

Type

Description

md5hash

string

MD5 hash of the file that you want to get.

sha256hash

string

SHA256 hash of the file that you want to get.

path

string

Path to the file that you want to get.

Example

type getFile = {

task: 'getFile';

targetHost: string;

params: {

// an empty string or a valid md5 hash of the file

md5hash: string;

// an empty string or a valid sha256 hash of the file

sha256hash: string;

// the path to the file

path: string;

};

responseEventIncidentArea: string;

};

Delete filedeleteFile

Delete file task settings

Parameter

Type

Description

md5hash

string

MD5 hash of the file that you want to delete.

sha256hash

string

SHA256 hash of the file that you want to delete.

path

string

Path to the file that you want to delete.

searchInSubfolders?

boolean

Search for the file that you want to delete in subfolders.

Example

type deleteFile = {

task: 'deleteFile';

targetHost: string;

params: {

// an empty string or a valid md5 hash of the file

md5hash: string;

// an empty string or a valid sha256 hash of the file

sha256hash: string;

// the path to the file

path: string;

// recursive search for a file (subfolder), optional

searchInSubfolders?: boolean;

};

responseEventIncidentArea: string;

};

Move file to QuarantinequarantineFile

Move file to Quarantine task settings

Parameter

Type

Description

md5hash

string

MD5 hash of the file that you want to quarantine.

sha256hash

string

SHA256 hash of the file that you want to quarantine.

path

string

Path to the file that you want to quarantine.

Example

type quarantineFile = {

task: 'quarantineFile';

targetHost: string;

params: {

// an empty string or a valid md5 hash of the file

md5hash: string;

// an empty string or a valid sha256 hash of the file

sha256hash: string;

// the path to the file

path: string;

};

responseEventIncidentArea: string;

};

IOC ScaniocScan

IOC Scan task settings

Parameter

Type

Description

ioc

string

Path to the ZIP archive with an IOC file in base64 encoding that you that you want to use for scanning. Required argument. Enter this argument manually.

isolateHost

boolean

Isolate the computer from the network when an indicator of compromise is detected to prevent the threat from spreading.

scanCriticalAreas

boolean

Run the Critical Areas Scan task when an indicator of compromise is detected.

quarantineObject

boolean

Delete the malicious object when an indicator of compromise is detected. Before deleting the object, Kaspersky Endpoint Security creates a backup copy in case the object needs to be restored later. Kaspersky Endpoint Security moves the backup copy to Quarantine.

Example

type iocScan = {

task: 'iocScan';

targetHost: string;

params: {

// the path to the zip archive with ioc files in base64 encoding

ioc: string;

// isolation of the computer from the network

isolateHost: boolean;

// critical areas scan

scanCriticalAreas: boolean;

// quarantine the file

quarantineObject: boolean;

};

responseEventIncidentArea: string;

};

Start processstartProcess

Start process task settings

Parameter

Type

Description

executablePath

string

Path to the executable file that is used to start the process.

arguments?

string

Additional command line arguments for starting the process.

workingFolder?

string

Path to the working folder of the process.

Example

type startProcess = {

task: 'startProcess';

targetHost: string;

params: {

// the path to the file

executablePath: string;

// command line arguments, optional

arguments?: string;

// a working folder, optional

workingFolder?: string;

};

responseEventIncidentArea: string;

};

Terminate processterminateProcess

Terminate process task settings

Parameter

Type

Description

md5hash

string

MD5 hash of the file whose process you want to terminate.

sha256hash

string

SHA256 hash of the file whose process you want to terminate.

path

string

Path to the file that you want to delete.

caseSensitive

boolean

Case sensitivity when searching for the file.

Example

type terminateProcess = {

task: 'terminateProcess';

targetHost: string;

params: {

// an empty string or a valid md5 hash of the file

md5hash: string;

// an empty string or a valid sha256 hash of the file

sha256hash: string;

// the path to the file

path: string;

// case sensitive of the file name

caseSensitive: boolean;

};

responseEventIncidentArea: string;

};

Computer network isolation – isolateHost

Computer network isolation settings

Parameter

Type

Description

action

string

MD5 hash of the file that you want to get.

Example

type isolateHost = {

task: 'isolateHost';

targetHost: string;

params: {

// 0 - turning off network isolation, 1 - turning on network isolation

action: number;

};

responseEventIncidentArea: string;

};

Execution prevention – preventExecution

Execution prevention settings

Parameter

Type

Description

hash

string

MD5 hash of the file that you want to prevent from running.

path

string

Path to the file that you want to prevent from running.

caseSensitive

boolean

Case sensitivity when searching for the file.

Example

type preventExecution = {

task: 'preventExecution';

targetHost: string;

params: {

// a valid md5 hash of the file

hash: string;

// the path to the file

path: string;

// case sensitive of the file name

caseSensitive: boolean;

};

responseEventIncidentArea: string;

};

Malware ScanonDemandScan

Malware Scan task settings

Parameter

Type

Description

path

string

Space-delimited list of files and folders for Custom Scan.

recursive

boolean

Recursive scanning mode.

type

number

Scan scope.

ScanObjectType = Enum("ScanObjectType",

[

("SystemMemory", 14),

("StartupObjectsAndRunningProcesses", 15),

("DiskBootSectors", 16),

("SystemBackupStorage", 17),

("Email", 18),

("Folder", 22),

("AllRemovableDrives", 23),

("AllNetworkDrives", 24),

("AllFixedDrives", 25)])

Example

type onDemandScan = {

task: 'onDemandScan';

targetHost: string;

// please note, this is an array

// array of scan object

params: [{

// enabling the scan object

enabled: boolean;

// an empty string or the path to the folder to scan

path: string;

// recursive scan mode

recursive: boolean;

// ID scan object

type: number;

}];

responseEventIncidentArea: string;

};

Page top