Skip to main content

SpyCloud - Malware Incident Enrichment

This Playbook is part of the SpyCloud Enterprise Protection Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

SpyCloud - Malware Incident Enrichment#

This playbook enables the enrichment of SpyCloud malware incidents. This playbook fetches the infected machine ID from the incident and if the organization has access to SpyCloud compass data, then it will pull all the additional records for the infected machine ID using spycloud-compass-device-data-get command and adds the data to the incident.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • SpyCloud Enterprise Protection

Scripts#

This playbook does not use any scripts.

Commands#

  • spycloud-compass-device-data-get
  • setIncident

Playbook Inputs#

NameDescriptionDefault ValueRequired
Infected Machine IDA unique identifier either extracted from an infostealer log, when present, or an RFC 4122-compliant universally unique identifier (UUID) generated by SpyCloud, when no identifier is present in an infected record.${incident.spycloudinfectedmachineid}Required.

Playbook Outputs#

PathTypeDescription
SpyCloud.CompassDeviceData.usernameStringUsername.
SpyCloud.CompassDeviceData.passwordStringAccount password.
SpyCloud.CompassDeviceData.password_plaintextStringThe cracked, plaintext version of the password (where the password is crackable).
SpyCloud.CompassDeviceData.password_typeStringPassword type for original password as found in the data breach. This will either be plaintext or one of the many password hash/encryption types (SHA1, MD5, 3DES, etc).
SpyCloud.CompassDeviceData.target_urlStringURL extracted from Botnet data. This is the URL that is captured from a key logger installed on an infected user's system.
SpyCloud.CompassDeviceData.user_browserStringBrowser name.
SpyCloud.CompassDeviceData.ip_addressesStringList of one or more IP addresses in alphanumeric format. Both IPV4 and IPv6 addresses are supported.
SpyCloud.CompassDeviceData.infected_machine_idStringA unique identifier either extracted from an infostealer log, when present, or an RFC 4122-compliant universally unique identifier (UUID) generated by SpyCloud, when no identifier is present in an infected record. The method of generation of these identifiers varies by malware family and may or may not conform to a UUID format. For the ID's in the aforementioned UUID format, there is not currently any way to determine whether an infected_machine_id was extracted from a malware log or generated by SpyCloud.
SpyCloud.CompassDeviceData.infected_pathStringThe local path to the malicious software installed on the infected user's system.
SpyCloud.CompassDeviceData.infected_timeDateThe time at which the user's system was infected with malicious software.
SpyCloud.CompassDeviceData.user_sys_domainStringSystem domain. This usually comes from Botnet data.
SpyCloud.CompassDeviceData.user_hostnameStringSystem hostname. This usually comes from Botnet data.
SpyCloud.CompassDeviceData.user_osStringSystem OS name. This usually comes from Botnet data.
SpyCloud.CompassDeviceData.user_sys_registered_ownerStringSystem registered owner name. This usually comes from Botnet data.
SpyCloud.CompassDeviceData.source_idNumberNumerical breach ID. This correlates directly with the id field in Breach Catalog objects.
SpyCloud.CompassDeviceData.spycloud_publish_dateDateThe date on which we ingested the breached data into our systems. This is the same date on which the data becomes publicly available to our customers.
SpyCloud.CompassDeviceData.target_domainStringSLD extracted from 'target_url' field.
SpyCloud.CompassDeviceData.target_subdomainStringSubdomain and SLD extracted from 'target_url' field.
SpyCloud.CompassDeviceData.severityNumberSeverity is a numeric code representing severity of a breach record. This can be used in API requests to ensure only Breach Records with plaintext password are returned. Possible values are: 2 -> Email only severity. This record is part of an email-only list. 5 -> Informational severity. This severity value is given to breach records where we have a non-crackable password hash, or no password at all. 20 -> High severity. This severity value is given to breach records where we have an email address and a plaintext password. 25 -> Critical severity. This severity value is given to breach records recovered from an infected machine (botnet data). These records will always have a plaintext password and most will have an email address.
SpyCloud.CompassDeviceData.document_idStringUUID v4 string which uniquely identifies this breach record in our data set.
SpyCloud.CompassDeviceData.emailStringEmail address.
SpyCloud.CompassDeviceData.email_domainStringDomain extracted from 'email_address' field. This is not a SLD, but everything after the '@' symbol.
SpyCloud.CompassDeviceData.email_usernameStringUsername extracted from 'email' field. This is everything before the '@' symbol.
SpyCloud.CompassDeviceData.domainStringDomain name.

Playbook Image#


SpyCloud Malware