Skip to main content

Phishing - Generic v3

This Playbook is part of the Phishing Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.8.0 and later.

This playbook investigates and remediates a potential phishing incident. It engages with the user who triggered the incident while investigating the incident itself.

Note:

  • Final remediation tasks are manual by default. can be managed by "SearchAndDelete" and "BlockIndicators" inputs.
  • Do not rerun this playbook inside a phishing incident since it can produce an unexpected result. Create a new incident instead if needed.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Detonate URL - Generic v1.5
  • Detect & Manage Phishing Campaigns
  • Phishing - Indicators Hunting
  • Extract Indicators From File - Generic v2
  • Block Indicators - Generic v3
  • Spear Phishing Investigation
  • Process Email - Generic v2
  • Search And Delete Emails - Generic v2
  • Process Microsoft's Anti-Spam Headers
  • Calculate Severity - Generic v2
  • Email Address Enrichment - Generic v2.1
  • TIM - Indicator Relationships Analysis
  • Detonate File - Generic
  • Entity Enrichment - Phishing v2
  • Phishing - Machine Learning Analysis

Integrations#

This playbook does not use any integrations.

Scripts#

  • Set
  • CheckEmailAuthenticity
  • SetAndHandleEmpty
  • AssignAnalystToIncident

Commands#

  • setIndicator
  • send-mail
  • closeInvestigation
  • setIncident

Playbook Inputs#


NameDescriptionDefault ValueRequired
RoleThe default role to assign the incident to.Required
SearchAndDeleteEnables the Search and Delete capability.
For a malicious email, the "Search and Delete" sub-playbook looks for other instances of the email and deletes them pending analyst approval.
FalseOptional
BlockIndicatorsThis input manages the automated block indicators capability.
Set to "True" for automatically block all malicious indicators.
Set to "False" to manually choose which indicators to block, if any.
FalseOptional
AuthenticateEmailDetermines whether the authenticity of the email should be verified using SPF, DKIM, and DMARC.TrueOptional
OnCallSet to True to assign only the user that is currently on shift.FalseOptional
SearchAndDeleteIntegrationDetermines which product and playbook is used to search and delete the phishing email from user inboxes.
- Set this to "O365" to use the "O365 - Security And Compliance - Search And Delete" playbook.
- Set this to "EWS" to use the "Search And Delete Emails - EWS" playbook.
- Set this to "Gmail" to use the "Search And Delete - Gmail" playbook.
EWSOptional
O365DeleteTypeSets the method to delete emails in the "O365 - Security And Compliance - Search And Delete" playbook. Can be "Soft" (recoverable), or "Hard" (unrecoverable). Leave empty to decide manually for each email incident.
This is only applicable if the SearchAndDeleteIntegration input is set to "O365".
SoftOptional
O365ExchangeLocationThe exchange location. Determines from where to search and delete emails using O365 playbooks. Use the value "All" to search all mailboxes. If no input provided, it will search and delete the email only from the recipient's mailboxes. Note - Searching all mailboxes may take a significant amount of time. This input is used only when searching and deleting emails in O365 and only applies if the SearchAndDeleteIntegration input is set to O365.Optional
O365AllowNotFoundSearchLocationsUsed only when searching and deleting emails in O365. Determines whether to include mailboxes other than regular user mailboxes in the compliance search.FalseOptional
O365ExchangeLocationExclusionUsed only when searching and deleting emails in O365. A comma-separated list of mailboxes/distribution groups to exclude when you use the value "All" for the O365ExchangeLocation input.Optional
CheckMicrosoftHeadersWhether to check Microsoft headers for BCL/PCL/SCL scores and set the "Severity" and "Email Classification" accordingly.TrueOptional
InternalDomainsA CSV list of internal domains. The list is used to determine whether an email address is internal or external.Optional
DetonateURLDetermines whether to use the "URL Detonation" playbook. Detonating a URL may take a few minutes.FalseOptional
InternalRangeThis input is used in the "Entity Enrichment - Phishing v2" playbook.
A list of internal IP ranges to check IP addresses against. The comma-separated list should be provided in CIDR notation. For example, a list of ranges is: "172.16.0.0/12,10.0.0.0/8,192.168.0.0/16" (without quotes).
lists.PrivateIPsOptional
PhishingModelNameOptional - the name of a pre-trained phishing model to predict phishing type using machine learning.Optional
GetOriginalEmailFor forwarded emails. When "True", retrieves the original email in the thread.

You must have the necessary permissions in your email service to execute global search.

- For EWS: eDiscovery
- For Gmail: Google Apps Domain-Wide Delegation of Authority
- For MSGraph: As described in these links
https://docs.microsoft.com/en-us/graph/api/message-get
https://docs.microsoft.com/en-us/graph/api/user-list-messages
FalseOptional
DBotPredictURLPhishingURLsNumberThe number of URLs to extract from the email HTML and analyze in the "DBotPredictURLPhishing" automation.
This automation runs several checks to determine the score of the URLs found in the email, sets a verdict for URLs found as "Suspicious" or "Malicious", and adds these URLs as indicators. Based on the verdict, the incident severity is set (Medium for "Suspicious" and High for "Malicious").
Note:
- You need to install the "Phishing URL" pack to use this automation.
- False/True positives are possible.
- This automation may take a few minutes to run.
- To increase result accuracy, it is recommended to install and enable the "Whois" pack (optional).
3Optional
EmailFileToExtractReported emails and emails retrieved during playbook execution can contain multiple nested email files. For example, an EML nested inside another EML file.
If multiple level files are detected, this field determines which file represents the phishing email.

For example:
User1 receives an email from Attacker. User1 attaches the email as an EML file and sends the email to User2.
User2 also attaches that email as a file, and reports it as phishing. In this case, the phishing email would be the "inner file" (as opposed to "outer file").

Possible values are: Inner file, Outer file, All files.
Inner file: The file at the deepest level is parsed. If there is only one file, that file is parsed.
Outer file: The file at the first level is parsed.
All files: All files are parsed. Do not use this option in the phishing playbook, as there should only be one phishing email per playbook run.
Inner fileOptional
HuntEmailIndicatorsWhether to enter the "Email Indicators Hunting" branch in the playbook. Under this branch, sub-playbooks would be triggered in order to hunt malicious indicators found in other emails and optionally, automatically create new incidents for each found email (configurable through next playbook inputs). Default is "True".TrueOptional
EmailHuntingCreateNewIncidentsWhen "True", the "Phishing - Handle Microsoft 365 Defender Results" sub-playbook will open new phishing incidents for each email that contains one of the malicious indicators. Default is "False".FalseOptional
ListenerMailboxThe mailbox which is being used to fetch phishing incidents. This mailbox would be excluded in the "Phishing - Indicators Hunting" playbook.
In case the value of this input is empty, the value of the "Email To" incident field will be automatically used as the listener mailbox.
Optional
SendMailInstanceThe name of the instance to be used when executing the "send-mail" command in the playbook. In case it will be empty, all available instances will be used (default).Optional
OriginalAuthenticationHeaderThis input will be used as the "original_authentication_header" argument in the "CheckEmailAuthenticity" script under the "Authenticate email" task.
The header that holds the original Authentication-Results header value. This can be used when an intermediate server changes the original email and holds the original header value in a different header. Note - Use this only if you trust the server creating this header.
Optional
UserEngagementSpecify whether to engage with the user via email for investigation updates.
Set the value to 'True' to allow user engagement, or 'False' to avoid user engagement.
TrueOptional
TakeManualActionsSpecify whether to stop the playbook to take additional action before closing the incident.
Set the value to 'True' to stop the playbook before closing the incidents, or "False" to close the incident once the playbook flow is done.
FalseOptional
KeyWordsToSearchA comma-separated list of keywords to search in the email body.
For example: name of the organization finance app that the attacker might impersonate.
This input is used in the "Spear Phishing Investigation" sub-playbook.
Optional
NonMaliciousEmailReviewIn case of an incident with a non-malicious email, it is possible either to close the incident or to review and approve it by an analyst.
Set the value "True" for a review of the incident by an analyst. Set the value "False" to close the incident.
TrueOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Phishing - Generic v3