Malware SIEM Ingestion - Get Incident Data
Malware Investigation and Response Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook handles incident ingestion from a SIEM.
The user provides which EDR system to use, the field containing the incident ID or detection ID, and the field indicating whether the ingested item is an incident or detection.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- CrowdStrike Falcon - SIEM ingestion Get Incident Data
- MDE SIEM ingestion - Get Incident Data
#
IntegrationsThis playbook does not use any integrations.
#
ScriptsThis playbook does not use any scripts.
#
CommandsThis playbook does not use any commands.
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
EDRProductToUse | The EDR to get data from when ingesting endpoint alerts using a SIEM. Values can be CrowdStrike or MDE. | ||
playbookInputQuery: | Required | ||
SIEMincidentFieldForType | The name of the field specifying the alert type. For example, for CrowdStrike this field specifies a detection or an incident. | ${incident.externalcategoryname} | Optional |
SIEMincidentFieldForID | The name of the field that provides the external ID of the alert or incident in the EDR. | ${incident.externalsystemid} | Optional |
OverrideSIEMSeverity | Whether to set the severity according to the EDR severity scale and its mapping to Cortex XSOAR (True) or keep the original severity scale as mapped by the SIEM (False). | False | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
CrowdStrike.Detection.Behavior.FileName | The file name of the behavior. | unknown |
CrowdStrike.Detection.Behavior.Scenario | The scenario name of the behavior. | unknown |
CrowdStrike.Detection.Behavior.MD5 | The MD5 hash of the IOC of the behavior. | unknown |
CrowdStrike.Detection.Behavior.SHA256 | The SHA256 hash of the IOC of the behavior. | unknown |
CrowdStrike.Detection.Behavior.IOCType | The type of the IOC. | unknown |
CrowdStrike.Detection.Behavior.IOCValue | The value of the IOC. | unknown |
CrowdStrike.Detection.Behavior.CommandLine | The command line executed in the behavior. | unknown |
CrowdStrike.Detection.Behavior.UserName | The user name related to the behavior. | unknown |
CrowdStrike.Detection.Behavior.SensorID | The sensor ID related to the behavior. | unknown |
CrowdStrike.Detection.Behavior.ParentProcessID | The ID of the parent process. | unknown |
CrowdStrike.Detection.Behavior.ProcessID | The process ID of the behavior. | unknown |
CrowdStrike.Detection.Behavior.ID | The ID of the behavior. | unknown |
CrowdStrike.Detection.System | The system name of the detection. | unknown |
CrowdStrike.Detection.CustomerID | The ID of the customer (CID). | unknown |
CrowdStrike.Detection.MachineDomain | The name of the domain of the detection machine. | unknown |
CrowdStrike.Detection.ID | The detection ID. | unknown |
CrowdStrike.Detection.ProcessStartTime | The start time of the process that generated the detection. | unknown |
CrowdStrike.FoundDetections | Indicates whether detections were found. | unknown |