<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automate Reported Phishing Email Attachments to CrowdStrike Falcon Sandbox w/ XSOAR in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578089#M3089</link>
    <description>&lt;P&gt;Typically a Phishing XSOAR incident would have been created from the emails fetched by an integration where each email is its own investigation/incident. An integration such as O365 or any other email fetching integration would attach each incident with the email that it fetched in. This is the scenario that I approached this question from. If you are not approaching phishing in this way, you will need to run the appropriate commands to fetch the email you'd like to send off to CS Falcon Sandbox.&lt;BR /&gt;&lt;BR /&gt;You will first need to identify which command will execute the query for the email, and ensure that it is working as expected. I suggest running the command within the Playground until you are confident in the inputs necessary for your desired query. The command you choose must return an email in a format that is accepted by CS Falcon.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Once you can see the correct file populated in the Context Data of the Playground, you can then manually calling the CS Falcon Sandbox command to submit said email. This will allow you to make changes to the command until you feel like you've understood the format of the inputs necessary.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Make sure to call !DeleteContext all=yes every so often to clear out Context Data of your Playground as pulling email files during testing will crowd the CD with data you may no longer need.&lt;BR /&gt;&lt;BR /&gt;Once you've identified the order of operations for your commands, you can then transfer them to your playbook.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I cannot speak to how you would specifically fetch in email files, and I am not familiar with your environment, but it looks like you are already doing so from your screenshot. The output of that command should create a new entry within ${File} for you to use in the CS Falcon command.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2024 15:40:42 GMT</pubDate>
    <dc:creator>MichaelHinderman</dc:creator>
    <dc:date>2024-02-22T15:40:42Z</dc:date>
    <item>
      <title>Automate Reported Phishing Email Attachments to CrowdStrike Falcon Sandbox w/ XSOAR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578059#M3082</link>
      <description>&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;7np9k&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;I have a question regarding XSOAR and combining both CrowdStrike + Abnormal Email Security with an integration.\n\nI was wondering how to create a playbook so when a user reports a email as phishing, to somehow have it automatically upload to CrowdStrike Falcon Sandbox for further analysis - Basically anytime a phishing email with an attachment is submitted to our company report phishing email, to pull it from Abnormal Email Security, then connect Abnormal to CrowdStrike Falcon Sandbox.\n\nWe already have CrowdStrike &amp;amp; Abnormal integrated/connected via API, as well as XSOAR packs installed.&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;
&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;7np9k&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;I have a question regarding XSOAR and combining both CrowdStrike + Abnormal Email Security with an integration.\n\nI was wondering how to create a playbook so when a user reports a email as phishing, to somehow have it automatically upload to CrowdStrike Falcon Sandbox for further analysis - Basically anytime a phishing email with an attachment is submitted to our company report phishing email, to pull it from Abnormal Email Security, then connect Abnormal to CrowdStrike Falcon Sandbox.\n\nWe already have CrowdStrike &amp;amp; Abnormal integrated/connected via API, as well as XSOAR packs installed.&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;
&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;8juua&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;I have a question regarding XSOAR and combining both CrowdStrike + Abnormal Email Security with an integration.\n\nI was wondering how to create a playbook so when a user reports a email as phishing, to somehow have it automatically upload to CrowdStrike Falcon Sandbox for further analysis - Basically anytime a phishing email with an attachment is submitted to our company report phishing email, to pull it from Abnormal Email Security, then connect Abnormal to CrowdStrike Falcon Sandbox.\n\nWe already have CrowdStrike &amp;amp; Abnormal integrated/connected via API, as well as XSOAR packs installed.&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;I was wondering how to create a playbook so when a user reports an email as phishing, to somehow have it automatically upload to the CrowdStrike Falcon Sandbox for further analysis - Basically anytime a phishing email with an attachment is submitted to our company report phishing email inbox, to pull it from Abnormal Email Security, then send it to CrowdStrike Falcon Sandbox.&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;8juua&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;I have a question regarding XSOAR and combining both CrowdStrike + Abnormal Email Security with an integration.\n\nI was wondering how to create a playbook so when a user reports a email as phishing, to somehow have it automatically upload to CrowdStrike Falcon Sandbox for further analysis - Basically anytime a phishing email with an attachment is submitted to our company report phishing email, to pull it from Abnormal Email Security, then connect Abnormal to CrowdStrike Falcon Sandbox.\n\nWe already have CrowdStrike &amp;amp; Abnormal integrated/connected via API, as well as XSOAR packs installed.&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-reddit-rtjson="{&amp;quot;entityMap&amp;quot;:{},&amp;quot;blocks&amp;quot;:[{&amp;quot;key&amp;quot;:&amp;quot;8juua&amp;quot;,&amp;quot;text&amp;quot;:&amp;quot;I have a question regarding XSOAR and combining both CrowdStrike + Abnormal Email Security with an integration.\n\nI was wondering how to create a playbook so when a user reports a email as phishing, to somehow have it automatically upload to CrowdStrike Falcon Sandbox for further analysis - Basically anytime a phishing email with an attachment is submitted to our company report phishing email, to pull it from Abnormal Email Security, then connect Abnormal to CrowdStrike Falcon Sandbox.\n\nWe already have CrowdStrike &amp;amp; Abnormal integrated/connected via API, as well as XSOAR packs installed.&amp;quot;,&amp;quot;type&amp;quot;:&amp;quot;unstyled&amp;quot;,&amp;quot;depth&amp;quot;:0,&amp;quot;inlineStyleRanges&amp;quot;:[],&amp;quot;entityRanges&amp;quot;:[],&amp;quot;data&amp;quot;:{}}]}"&gt;We already have Abnormal connected to CrowdStrike via API, as well as XSOAR packs installed.&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 22 Feb 2024 14:00:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578059#M3082</guid>
      <dc:creator>passat2k</dc:creator>
      <dc:date>2024-02-22T14:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: Automate Reported Phishing Email Attachments to CrowdStrike Falcon Sandbox w/ XSOAR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578080#M3087</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;When an XSOAR integration which fetches emails returns back with an email, the resulting incident will be populated with not only the content of the email, but also an entry called "File" that relates to the email itself. The data in this path may include further files that were attached to the email. You can identify which file entry is the email by looking at the extensions path ${File.extension}. From here, you can create a playbook that will call the Crowdstrike Falcon Sandbox command "cs-falcon-sandbox-submit-sample",&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This command will ask for a file to submit. The input may be called "entry-id" or similar. This is expecting the entry-id of the file. The entry ID is an id that references an entry within the war room starting from &lt;A href="mailto:1@&amp;lt;incidentid&amp;gt;" target="_blank"&gt;1@&amp;lt;incidentid&amp;gt;&lt;/A&gt;. This value is also referenced within the File entry in Context Data.&lt;BR /&gt;&lt;BR /&gt;So your call to&amp;nbsp;cs-falcon-sandbox-submit-sample may look like this.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-02-22 at 9.13.33 AM.png" style="width: 485px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57803i2C115F5912136FDF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-02-22 at 9.13.33 AM.png" alt="Screenshot 2024-02-22 at 9.13.33 AM.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:14:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578080#M3087</guid>
      <dc:creator>MichaelHinderman</dc:creator>
      <dc:date>2024-02-22T15:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Automate Reported Phishing Email Attachments to CrowdStrike Falcon Sandbox w/ XSOAR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578083#M3088</link>
      <description>&lt;P&gt;Hey! Thanks for getting back. So when I create a playbook do I need to create tasks such as listening for our &lt;A href="mailto:phishing@company.com" target="_blank" rel="noopener"&gt;phishing@company.com &lt;/A&gt;inbox, get details of the reported email (using the &lt;A href="https://xsoar.pan.dev/docs/reference/integrations/abnormal-security#abnormal-security-list-threats" target="_self"&gt;Abnormal Security Scripts&lt;/A&gt;)? Or would this be using the &lt;A href="https://xsoar.pan.dev/docs/reference/integrations/mail-listener-v2#overview" target="_self"&gt;standard mail listener integration&lt;/A&gt;?then do the suggested Upload Email to CS Falcon Sandbox task?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SCR-20240222-jnmr.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57804i76166553C5BE5108/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SCR-20240222-jnmr.png" alt="SCR-20240222-jnmr.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:30:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578083#M3088</guid>
      <dc:creator>passat2k</dc:creator>
      <dc:date>2024-02-22T15:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: Automate Reported Phishing Email Attachments to CrowdStrike Falcon Sandbox w/ XSOAR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578089#M3089</link>
      <description>&lt;P&gt;Typically a Phishing XSOAR incident would have been created from the emails fetched by an integration where each email is its own investigation/incident. An integration such as O365 or any other email fetching integration would attach each incident with the email that it fetched in. This is the scenario that I approached this question from. If you are not approaching phishing in this way, you will need to run the appropriate commands to fetch the email you'd like to send off to CS Falcon Sandbox.&lt;BR /&gt;&lt;BR /&gt;You will first need to identify which command will execute the query for the email, and ensure that it is working as expected. I suggest running the command within the Playground until you are confident in the inputs necessary for your desired query. The command you choose must return an email in a format that is accepted by CS Falcon.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Once you can see the correct file populated in the Context Data of the Playground, you can then manually calling the CS Falcon Sandbox command to submit said email. This will allow you to make changes to the command until you feel like you've understood the format of the inputs necessary.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Make sure to call !DeleteContext all=yes every so often to clear out Context Data of your Playground as pulling email files during testing will crowd the CD with data you may no longer need.&lt;BR /&gt;&lt;BR /&gt;Once you've identified the order of operations for your commands, you can then transfer them to your playbook.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I cannot speak to how you would specifically fetch in email files, and I am not familiar with your environment, but it looks like you are already doing so from your screenshot. The output of that command should create a new entry within ${File} for you to use in the CS Falcon command.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 15:40:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/automate-reported-phishing-email-attachments-to-crowdstrike/m-p/578089#M3089</guid>
      <dc:creator>MichaelHinderman</dc:creator>
      <dc:date>2024-02-22T15:40:42Z</dc:date>
    </item>
  </channel>
</rss>

