Skip to main content

FireEye ETP - Indicators Hunting

This Playbook is part of the FireEye ETP Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook queries FireEye Email Threat Prevention (ETP) for indicators such as domains, IP addresses, sender and recipient email addresses. Separate searches are conducted for each type of indicator in the playbook.

Note that multiple search values should be separated by commas only (without spaces or any special characters).

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • FireEye ETP

Scripts#

  • SetAndHandleEmpty
  • IsIntegrationAvailable

Commands#

  • fireeye-etp-search-messages

Playbook Inputs#


NameDescriptionDefault ValueRequired
IPAddressA single or multiple IP address to search for within FireEye ETP logs. Used for both source and destination IP addresses.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
DomainSingle or multiple domains to search for within FireEye ETP logs.
By default, the 'contains' clause is used.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
EmailAddressA single or multiple email addresses to search for within FireEye ETP logs. Used for both recipient and sender email addresses.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
from_email_not_inList of sender email addresses to be excluded.
The max limit of entries is 10.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
recipients_not_inList of recipient email addresses to be excluded (including "cc").
The max limit of entries is 10.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
has_attachmentsBoolean value filter to indicate if the message has attachments.
Values can be only 'true' or 'false'.
Optional
max_message_sizeSelect the message size (in KB) based on which you wish to retrieve messages from the FireEye ETP server.

The default value is 20 and the maximum value is 100.
Optional
from_accepted_date_timeThe start date and time from which you would like to retrieve messages from the FireEye ETP server, e.g. 2017-10-24T10:48:51.000Z.

For a complete date range, specify 'to_accepted_date_time' as well.
Required
to_accepted_date_timeThe end date and time specify the period of time in which messages should be retrieved from the FireEye ETP server, e.g. 2017-10-24T10:48:51.000Z.

For a complete date range, specify 'from_accepted_date_time' as well.
Required
last_modified_date_timeThe last date and time messages were modified in order to retrieve them from the FireEye ETP server.

Dates and times should be accompanied by one of the following operators: ">", "<", ">=", "<=".
E.g. use value "<2017-10-24T18:00:00.000Z" to search for messages that were last modified after the specified time stamp.
Optional
statusFilter messages to be retrieved from the FireEye ETP server based on their email message status.

Possible values are: "accepted", "deleted", "delivered", "delivered (retroactive)", "dropped", "dropped oob", "dropped (oob retroactive)", "permanent failure", "processing", "quarantined", "rejected", "temporary failure".

Separate multiple search values by commas only (without spaces or any special characters).
Optional
status_not_inExclude messages from being retrieved from the FireEye ETP server based on the email message status.

Possible values are: "accepted", "deleted", "delivered", "delivered (retroactive)", "dropped", "dropped oob", "dropped (oob retroactive)", "permanent failure", "processing", "quarantined", "rejected", "temporary failure".

Separate multiple search values by commas only (without spaces or any special characters).
Optional
rejection_reasonFilter messages that should be retrieved from the FireEye ETP server based on the email rejection reason.

Possible values are: "ETP102", "ETP103", "ETP104", "ETP200", "ETP201", "ETP203", "ETP204", "ETP205", "ETP300", "ETP301", "ETP302", "ETP401", "ETP402", "ETP403", "ETP404", "ETP405".

Separate multiple search values by commas only (without spaces or any special characters).
Optional
subjectFilter messages that should be retrieved from the FireEye ETP server based on the email subject (string).

The max limit of entries is 10.

Separate multiple search values by commas only (without spaces or any special characters).
Optional

Playbook Outputs#


PathDescriptionType
FireEyeETP.HuntingResultsEmail message objects and fields that were retrieved from FireEye ETP.string
FireEyeETP.HuntingResults.acceptedDateTimeMessage accepted date.string
FireEyeETP.HuntingResults.lastModifiedDateTimeMessage last modified date.string
FireEyeETP.HuntingResults.countryCodeSender country code.string
FireEyeETP.HuntingResults.domainDomain.string
FireEyeETP.HuntingResults.recipientHeaderList of message recipients header (includes the display name of the user).string
FireEyeETP.HuntingResults.recipientsList of message recipients.string
FireEyeETP.HuntingResults.senderHeaderMessage sender header (includes the display name of the user).string
FireEyeETP.HuntingResults.senderMessage sender address.string
FireEyeETP.HuntingResults.senderSMTPMessage sender SMTP.string
FireEyeETP.HuntingResults.senderIPMessage sender IP.string
FireEyeETP.HuntingResults.statusMessage status.string
FireEyeETP.HuntingResults.subjectMessage subjectstring
FireEyeETP.HuntingResults.idMessage ID.string

Playbook Image#


FireEye ETP - Indicators Hunting