ExamRange

CSA (312-39) SOC Simulation Lab

Master the post-incident activity phase. In this module, you will evaluate tools used by incident handlers to parse complex telemetry and automate the generation of structured security reports.

Scenario Context

Organization: FinTrust Regional Bank
Phase: Post-Incident Activity (NIST IR Lifecycle)
Status: Containment & Eradication complete.

Your SOC team successfully contained a localized Emotet malware outbreak affecting 14 endpoints. L1/L2 analysts have dumped raw telemetry into the central repo: PCAPs, CrowdStrike execution graphs, and Splunk raw logs.

The CISO requires a comprehensive Incident Report by EOD for the board and the external regulatory body. You need a tool to ingest these disparate feeds, process them into a unified format, and generate an efficient, standardized report. Doing this manually via Word/Excel will result in missed IOCs and timeline errors.

Security Environment Telemetry

Splunk SPL - Incident IOC Extraction Raw Data Volume: HIGH
index=edr sourcetype=crowdstrike:process:rollupevent incident_id="INC-2023-909"
| search process_name="powershell.exe" command_line="*-enc*"
| stats count min(_time) as first_seen max(_time) as last_seen by hostname, user, command_line, file_hash
| table hostname, user, first_seen, file_hash

The sheer volume of raw JSON and CSV output from these queries needs to be parsed, enriched, and pushed into a structured document format automatically.

Question

Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?