Create Indicator Extract Rules for a Playbook Task - Threat Intel Management Guide - 8 - Cortex XSOAR - Cortex - Security Operations

Cortex XSOAR Threat Intel Management Guide

Product
Cortex XSOAR
Version
8
Creation date
2023-11-02
Last date published
2024-02-22
Category
Threat Intel Management Guide
Abstract

Create indicator extraction rules for a playbook task in Cortex XSOAR. Auto extract for a playbook task.

When using indicator extraction rules, indicators are extracted from tasks in playbooks.

The default indicator extraction value depends on the playbook task. For example, the indicator extraction mode is set to none in the Enrich offending user account task (from the Impossible Traveler playbook). In the Extract the email address of the reporting user task (from the Phishing Generic V3 playbook) indicator extract is set to system default.

Note

If you select system default in a task, the default is set to none.

You can use the following commands in a task:

  • extractIndicators

  • Reputation commands, such as !ip, !domain, etc.

    Note

    Reputation commands, such as !ip, !domain can only be used when you configure and enable a reputation integration instance, such as Virus Total, Whois, etc.

  • enrichIndicators

For more information, see Run Indicator Extraction in the CLI.

  1. To edit a content pack installed playbook, click either Duplicate Playbook or Detach Playbook.

  2. Select the playbook where you want to extract indicators, and click Edit.

  3. In the playbook, click a task to extract indicators.

  4. Click the Advanced tab.

  5. In the indicator extraction drop down menu, select the mode you want to use.

  6. Click OK.

Extract Indicators from a Phishing Email

The following scenario shows how indicator extraction is used in the Process Email - Generic v2 playbook to extract and enrich a specific group of indicators.

This playbook parses the headers in the original email used in a phishing attack. It is important to parse the original email used in the phishing attack and not the email that was forwarded to ensure that you only extract the email headers from the malicious email and not the one your organization uses to report phishing attacks.

  1. Go to the Playbooks page and search for the Process Email - Generic v2 playbook.

  2. Click either Duplicate Playbook or Detach Playbook.

  3. If you have already duplicated or detached the playbook, click Edit.

  4. Scroll down and open the Add original email details to context task.

  5. In the Automation field, click Set and select ParseEmailFilesV2.

    In the Outputs tab you can see all of the different data that the task extracts, such as Email To, CC, From, etc.

  6. Go to the Advanced tab.

    Under Indicator Extraction mode, ensure that the Inline option is selected. This indicates that all of the outputs are processed before the playbook moves ahead to the next task.

  7. Open the Display email information in layout task. This task receives the data from the saved attachment tasks and sets the various data points to context.

    Under the Advanced tab, ensure that Indicator Extraction mode is set to None, as the indicators have already been extracted earlier in the Extract email artifacts and attachments task and there is no need to do it again.