First, if you are not already dropping traffic to/from the netbios ports, you should do that.
/ip firewall filter
add chain=forward protocol=udp port=445,135-139 action=drop
add chain=forward protocol=tcp port=445,135-139 action=drop
If it is some virus that does not spread using netbios, then you should identify the traffic with either torch or a firewall rule that logs traffic. Something like the following will give you a log rule:
/ip firewall filter
add chain=forward action=log
That is likely to generate a LOT of traffic. You can tune the above rule to narrow down what traffic you are looking for with the log action.