So you’ve got some threat intelligence here, firewall logs, XDR logs, logs from there, alerts from there, digital risk information from over there, and basically, a giant mess of alerts, notifications, and data from vectors you didn’t even know you had. Along with 250 other alerts.  Monday, once again.

“ALERT:  Exposed Credential from RaidForums”

“ALERT:  Phishing Site at notyourwebsitebutlookslikeit.com”

“So what, Davitt?” I hear you saying. You probably know where I’m going with this. Enrichment, Playbooks, and Automation. (I mean, it’s up there in the title, right?) Some of you are doing quite a lot of it, and we are extending that ability into SearchLight. The power of adding curated threat intelligence from Digital Shadows (now ReliaQuest) allows you to get more from your XSOAR playbooks – not only from a SOC investigation perspective but also to “operationalize” it. Finding ways to automate repetitive, error-prone tasks and ensure the proper actions are taken each and every time is critical in a fast-moving security landscape with limited resources.

Introducing Automatic Playbooks in XSOAR

The Digital Shadows SearchLight (now ReliaQuest GreyMatter DRP)™ platform has several automated functions already in place, but we’re taking some steps with Palo Alto Networks’ XSOAR platform to make your life a little easier, workflows a little faster, and usingSearchLight (now ReliaQuest’s GreyMatter Digital Risk Protection)even easier. To do that, we’ve developed our first playbook on the XSOAR platform. Named “Digital Shadows (now ReliaQuest) Retrieve Exposed Credentials,” the playbook does exactly what you’d expect. 

In the XSOAR marketplace, it will look like this:

Digital Shadows (now ReliaQuest) ‘Retrieve Exposed Credentials Playbook’ in XSOAR

To use it, enable the Digital Shadows (now ReliaQuest) integration (to current Digital Shadows (now ReliaQuest) clients, email me if you don’t have an API key; happy to set it up for you) in XSOAR.

To start, go to “Settings”, then “Integrations”.  Search for Digital Shadows (now ReliaQuest):

Search for “Digital Shadows (now ReliaQuest)” in the Integrations section of XSOAR

On the gear icon of the Content Pack, you’ll enter your API credentials. Again, contact me or the Digital Shadows (now ReliaQuest) team for assistance. 

Once that’s done, in a matter of moments (depending on your XSOAR installation), you’ll have incidents pulled into XSOAR.

Digital Shadows (now ReliaQuest) alerts automatically populated into Cortex XSOAR

From here, you can either use the default Digital Shadows (now ReliaQuest) playbook, or link it/integrate it into your existing workflows.

I created a very basic playbook, which extracts the Indicators (the email addresses) into the Intelligence Incident:

Digital Shadows (now ReliaQuest) playbook in XSOAR to extract Indicators into the Intelligence Incident

This will then allow you to dive into the incident and execute some of the basic Digital Shadows (now ReliaQuest) commands. For example:

Command to find Data Breach Records within XSOAR

Will Return:

Hundreds of Breach Records from Digital Shadows (now ReliaQuest) Threat Intelligence in XSOAR for ‘molnet’

(Molnnet.com is our faux company, so I’m not letting any real secrets out of the bag here).

You can see the email address, the domain names affected, as well as the password if it’s contained in the breach record. You can also pivot on the email address to see where else it’s recorded in incidents, or, if you have other automation/enrichment sources (Active Directory, etc.), you can pull that information in as well.

From the command line in XSOAR:

Automatically pivot to evidence- view using a Digital Shadows (now ReliaQuest) command in XSOAR

You can execute many of the Digital Shadows (now ReliaQuest) commands and have them return results.  For example:

 < !ds-find-vulnerabilities >

Will return something like:

Vulnerabilities returned from the Digital Shadows (now ReliaQuest) command within XSOAR

Now, you can seeSearchLight (now ReliaQuest’s GreyMatter Digital Risk Protection)pushed that alert into XSOAR, and if that was one of my IP addresses, from there, I could pivot into a playbook to do some enrichment/investigation on it, with things like !IPtoHost, or IPReputation, or any other playbook or integration I may have.

For example, this quick playbook (which I just linked together from the defaults) displays the email addresses in the breach, queries for more information from Active Directory, checks if there is an active email address, and then displays this in the War Room.

Whew! Not bad for a couple quick “out of the box” integrations.

In the Future…

Along with the credential enrichment, Digital Shadows (now ReliaQuest) have other playbooks on the horizon, including enhancement around vulnerability information, domain intelligence/reputation, and searching the Shadow Search (now ReliaQuest GreyMatter Digital Risk Protection) database for events/strings/values that XSOAR may bring to your attention.

Digital Shadows (now ReliaQuest) is also developing the Automation pieces to go along with these; if you are able to retrieve something with XSOAR, you can automate it. You could potentially use the Digital Shadows (now ReliaQuest) FIND feature, then use the Block IP automation script.  

Keep an eye on this space! We’re excited about XSOAR, and we know you are too. If you have questions, or want to seeSearchLight (now ReliaQuest’s GreyMatter Digital Risk Protection)in action, get a free trial or request a demo here.