Skip to main content

Palo Alto Networks Threat Vault v2

This Integration is part of the Threat Vault by Palo Alto Networks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

Use the Palo Alto Networks Threat Vault to research the latest threats (vulnerabilities/exploits, viruses, and spyware) that Palo Alto Networks next-generation firewalls can detect and prevent. This integration was integrated and tested with Palo Alto Networks Threat Vault v2.

Some changes have been made that might affect your existing content. If you are upgrading from a previous version of this integration, see Breaking Changes.

Configure Palo Alto Networks Threat Vault v2 on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Instances.

  2. Search for Palo Alto Networks Threat Vault v2.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    URLTrue
    API KeyTrue
    Source ReliabilityReliability of the source providing the intelligence data.
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    Fetch incidentsFalse
    Incident typeFalse
    First fetch timestamp (<number> <time unit>, e.g., 3 days)The time unit must be days, months, or years.False
    Incidents Fetch IntervalFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

file#


Checks the reputation of an antivirus in Threat Vault.

Base Command#

file

Input#

Argument NameDescriptionRequired
fileA comma-separated list of SHA256 or MD5 hashes of the antivirus signature.Required

Context Output#

PathTypeDescription
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.
File.MD5StringThe MD5 hash of the file.
File.SHA1StringThe SHA1 hash of the file.
File.SHA256StringThe SHA256 hash of the file.
File.Malicious.VendorStringFor malicious files, the vendor that made the decision.
ThreatVault.FileInfo.filetypeStringThe file type of the file.
ThreatVault.FileInfo.sha256StringThe SHA256 of the file.
ThreatVault.FileInfo.sha1StringThe SHA1 of the file.
ThreatVault.FileInfo.md5StringThe MD5 of the file.
ThreatVault.FileInfo.sizeStringThe size of the file.
ThreatVault.FileInfo.typeStringThe type of the file.
ThreatVault.FileInfo.familyStringThe family of the file.
ThreatVault.FileInfo.platformStringThe platform of the file.
ThreatVault.FileInfo.wildfire_verdictStringThe Wildfire verdict.
ThreatVault.FileInfo.create_timeStringThe threat signature creation time.
ThreatVault.FileInfo.signaturesStringThe signatures.

Command example#

!file file= 7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8

Context Example#

{
"DBotScore": {
"Indicator": "7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8",
"Reliability": "D - Not usually reliable",
"Score": 3,
"Type": "file",
"Vendor": "Palo Alto Networks Threat Vault v2"
},
"File": {
"Hashes": [
{
"type": "MD5",
"value": "7e8d3744c0a06d3c7ca7f6dbfce3d576"
},
{
"type": "SHA256",
"value": "7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8"
}
],
"MD5": "7e8d3744c0a06d3c7ca7f6dbfce3d576",
"Malicious": {
"Description": null,
"Vendor": "Palo Alto Networks Threat Vault v2"
},
"SHA256": "7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8"
}
}

Human Readable Output#

Hash 7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8 antivirus reputation:#

ActiveCreateTimeFileTypeMD5ReleaseSHA256SignatureId
active2012-07-04T03:36:54ZPE327e8d3744c0a06d3c7ca7f6dbfce3d576antivirus: {"first_release_version": "316", "first_release_time": "2010-10-04T17:03:41Z", "last_release_version": "786", "last_release_time": "2012-07-05T17:03:14Z"}7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf893534285

cve#


Checks the reputation of CVE in Threat Vault.

Base Command#

cve

Input#

Argument NameDescriptionRequired
cveA comma-separated list of CVE names.Required

Context Output#

PathTypeDescription
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorunknownThe vendor used to calculate the score.
DBotScore.IndicatorStringThe indicator that was tested.
CVE.IDStringThe CVE ID.
CVE.DescriptionStringA description of the CVE.
CVE.CVSS.ScoreStringThe CVSS of the CVE.
CVE.ModifiedStringThe timestamp of when the CVE was last modified.
CVE.PublishedStringThe timestamp of when the CVE was published.
ThreatVault.Vulnerability.idStringThe unique ID of the threat.
ThreatVault.Vulnerability.nameStringThe name of the threat.
ThreatVault.Vulnerability.descriptionStringThe description of the threat.
ThreatVault.Vulnerability.categoryStringThe threat category of the threat.
ThreatVault.Vulnerability.min_versionStringThe PAN-OS minimum version.
ThreatVault.Vulnerability.max_versionStringThe PAN-OS maximum version.
ThreatVault.Vulnerability.severityStringThe severity of the threat.
ThreatVault.Vulnerability.default_actionStringThe default action when the signature is triggered.
ThreatVault.Vulnerability.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Vulnerability.vendor.ArrayThe vulnerability identifier issued by the vendor on advisories.
ThreatVault.Vulnerability.referenceArrayThe public reference of the threat.
ThreatVault.Vulnerability.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Vulnerability.detailsObjectAny additional details of the threat.
ThreatVault.Vulnerability.ori_release_versionStringThe original release version of the threat.
ThreatVault.Vulnerability.latest_release_versionStringThe latest release version of the threat.
ThreatVault.Vulnerability.ori_release_timeStringThe original release time of the threat.
ThreatVault.Vulnerability.latest_release_timeStringThe latest release time of the threat.

Command example#

!cve cve=CVE-2020-2040

Context Example#

{
"CVE": {
"CVSS": {
"Score": "critical"
},
"Description": "Palo Alto Networks PAN-OS is prone to a buffer overflow vulnerability while parsing certain crafted HTTP requests. The vulnerability is due to the lack of proper checks on HTTP requests, leading to an exploitable buffer overflow vulnerability. An attacker could exploit the vulnerability by sending crafted HTTP requests. A successful attack could lead to remote code execution.",
"ID": "CVE-2020-2040",
"Modified": "2020-09-09T09:45:08Z",
"Published": "2020-09-09T09:45:08Z"
},
"DBotScore": {
"Indicator": "CVE-2020-2040",
"Score": 0,
"Type": "cve",
"Vendor": "Palo Alto Networks Threat Vault v2"
}
}

Human Readable Output#

CVE CVE-2020-2040 vulnerability reputation:#

CVECategoryDefault actionIDLatest release timeLatest release versionNameOri release timeOri release versionReferenceSeverityStatus
CVE-2020-2040code-executionreset-server592552020-09-09T09:45:08Z8317Palo Alto Networks PAN-OS Buffer Overflow Vulnerability2020-09-09T09:45:08Z8317https://security.paloaltonetworks.com/CVE-2020-2040criticalreleased

threatvault-threat-signature-get#


Gets the antivirus or anti-spyware or files signature.

Base Command#

threatvault-threat-signature-get

Input#

Argument NameDescriptionRequired
sha256A comma-separated list of SHA256 hashes of the antivirus signature.Optional
md5A comma-separated list of MD5 hash of the antivirus signature.Optional
signature_idA comma-separated list of IDs of the anti-spyware or antivirus signature.Optional

Context Output#

PathTypeDescription
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.
File.MD5StringThe MD5 hash of the file.
File.SHA1StringThe SHA1 hash of the file.
File.SHA256StringThe SHA256 hash of the file.
File.Malicious.VendorStringFor malicious files, the vendor that made the decision.
ThreatVault.Vulnerability.idStringThe unique ID of the threat.
ThreatVault.Vulnerability.nameStringThe name of the threat.
ThreatVault.Vulnerability.descriptionStringThe description of the threat.
ThreatVault.Vulnerability.categoryStringThe threat category of the threat.
ThreatVault.Vulnerability.min_versionStringThe PAN-OS minimum version.
ThreatVault.Vulnerability.max_versionStringThe PAN-OS maximum version.
ThreatVault.Vulnerability.severityStringThe severity of the threat.
ThreatVault.Vulnerability.default_actionStringThe default action when the signature is triggered.
ThreatVault.Vulnerability.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Vulnerability.vendor.ArrayThe vulnerability identifier issued by the vendor on advisories.
ThreatVault.Vulnerability.referenceArrayThe public reference of the threat.
ThreatVault.Vulnerability.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Vulnerability.detailsObjectAny additional details of the threat.
ThreatVault.Vulnerability.ori_release_versionStringThe original release version of the threat.
ThreatVault.Vulnerability.latest_release_versionStringThe latest release version of the threat.
ThreatVault.Vulnerability.ori_release_timeStringThe original release time of the threat.
ThreatVault.Vulnerability.latest_release_timeStringThe latest release time of the threat.
ThreatVault.Spyware.idStringThe unique ID of the threat.
ThreatVault.Spyware.nameStringThe name of the threat.
ThreatVault.Spyware.descriptionStringThe description of the threat.
ThreatVault.Spyware.vendorArrayThe spyware identifier issued by the vendor on advisories.
ThreatVault.Spyware.severityStringThe severity of the threat.
ThreatVault.Spyware.default_actionStringThe default action when the signature is triggered.
ThreatVault.Spyware.detailsObjectAny additional details of the threat.
ThreatVault.Spyware.referenceArrayThe public reference of the threat.
ThreatVault.Spyware.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Spyware.min_versionStringThe PAN-OS minimum version.
ThreatVault.Spyware.max_versionStringThe PAN-OS maximum version.
ThreatVault.Spyware.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Antivirus.idStringThe unique ID of the threat.
ThreatVault.Antivirus.nameStringThe name of the threat.
ThreatVault.Antivirus.actionStringThe action of the threat.
ThreatVault.Antivirus.descriptionStringThe description of the threat.
ThreatVault.Antivirus.subtypeStringThe subtype of the threat.
ThreatVault.Antivirus.typeStringThe type of the threat.
ThreatVault.Antivirus.create_timeStringThe create time of the threat.
ThreatVault.Antivirus.related_sha256_hashesStringThe related SHA256 hashes of the threat.
ThreatVault.Antivirus.releaseStringInformation about the signature release.
ThreatVault.Fileformat.idStringThe unique ID of the threat.
ThreatVault.Fileformat.nameStringThe name of the threat.
ThreatVault.Fileformat.descriptionStringThe description of the threat.
ThreatVault.Fileformat.categoryStringThe threat category of the threat.
ThreatVault.Fileformat.min_versionStringThe PAN-OS minimum version.
ThreatVault.Fileformat.max_versionStringThe PAN-OS maximum version.
ThreatVault.Fileformat.severityStringThe severity of the threat.
ThreatVault.Fileformat.default_actionStringThe default action when the signature is triggered.
ThreatVault.Fileformat.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Fileformat.vendorArrayThe file format identifier issued by the vendor on advisories.
ThreatVault.Fileformat.referenceArrayThe public reference of the threat.
ThreatVault.Fileformat.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Fileformat.detailsArrayAny additional details of the threat.
ThreatVault.Fileformat.ori_release_versionStringThe original release version of the threat.
ThreatVault.Fileformat.latest_release_versionStringThe latest release version of the threat.
ThreatVault.Fileformat.ori_release_timeStringThe original release time of the threat.
ThreatVault.Fileformat.latest_release_timeStringThe latest release time of the threat.
ThreatVault.FileInfo.filetypeStringThe file type of the file.
ThreatVault.FileInfo.sha256StringThe SHA256 of the file.
ThreatVault.FileInfo.sha1StringThe SHA1 of the file.
ThreatVault.FileInfo.md5StringThe MD5 of the file.
ThreatVault.FileInfo.sizeStringThe size of the file.
ThreatVault.FileInfo.typeStringThe type of the file.
ThreatVault.FileInfo.familyStringThe family of the file.
ThreatVault.FileInfo.platformStringThe platform of the file.
ThreatVault.FileInfo.wildfire_verdictStringThe Wildfire verdict.
ThreatVault.FileInfo.create_timeStringThe threat signature creation time.
ThreatVault.FileInfo.signaturesStringThe signatures.
ThreatVault.DNS.idStringThe unique ID of the threat.
ThreatVault.DNS.nameStringThe name of the threat.
ThreatVault.DNS.descriptionStringThe description of the threat.
ThreatVault.DNS.typeStringThe type of the threat.
ThreatVault.DNS.severityStringThe severity of the threat.
ThreatVault.DNS.subtypeStringThe subtype of the threat.
ThreatVault.DNS.actionStringThe action of the threat.
ThreatVault.DNS.create_timeStringThe threat signature creation time.
ThreatVault.DNS.releaseStringInformation about the signature release.
ThreatVault.DNS.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.RTDNS.idStringThe unique ID of the threat.
ThreatVault.RTDNS.nameStringThe name of the threat.
ThreatVault.RTDNS.descriptionStringThe description of the threat.
ThreatVault.RTDNS.typeStringThe type of the threat.
ThreatVault.RTDNS.severityStringThe severity of the threat.
ThreatVault.RTDNS.subtypeStringThe subtype of the threat.
ThreatVault.RTDNS.actionStringThe action of the threat.
ThreatVault.RTDNS.create_timeStringThe threat signature creation time.
ThreatVault.RTDNS.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.SpywareC2.idStringThe unique ID of the threat.
ThreatVault.SpywareC2.nameStringThe name of the threat.
ThreatVault.SpywareC2.descriptionStringThe description of the threat.
ThreatVault.SpywareC2.typeStringThe type of the threat.
ThreatVault.SpywareC2.severityStringThe severity of the threat.
ThreatVault.SpywareC2.subtypeStringThe subtype of the threat.
ThreatVault.SpywareC2.actionStringThe action of the threat.
ThreatVault.SpywareC2.create_timeStringThe threat signature creation time.
ThreatVault.SpywareC2.releaseStringInformation about the signature release.
ThreatVault.SpywareC2.statusStringThe status of the threat (e.g., inactive, active, or released).

Command example#

!threatvault-threat-signature-get signature_id=93534285

Context Example#

{
"ThreatVault": {
"Antivirus": {
"action": "",
"create_time": "2010-10-01T03:28:57Z",
"description": "This signature detected Worm/Win32.autorun.crck",
"id": "93534285",
"name": "Worm/Win32.autorun.crck",
"related_sha256_hashes": [
"7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8",
"9e12c5cdb069f74487c11758e732d72047b72bedf4373aa9e3a58e8e158380f8"
],
"release": {
"antivirus": {
"first_release_time": "2010-10-04T17:03:41Z",
"first_release_version": "316",
"last_release_time": "2012-07-05T17:03:14Z",
"last_release_version": "786"
}
},
"severity": "medium",
"status": "active",
"subtype": "virus",
"type": "0"
}
}
}

Human Readable Output#

93534285 antivirus reputation:#

Create timeIDNameRelated sha256 hashesReleaseSeveritySubtype
2010-10-01T03:28:57Z93534285Worm/Win32.autorun.crck7a520be9db919a09d8ccd9b78c11885a6e97bc9cc87414558254cef3081dccf8,
9e12c5cdb069f74487c11758e732d72047b72bedf4373aa9e3a58e8e158380f8
antivirus: {"first_release_version": "316", "first_release_time": "2010-10-04T17:03:41Z", "last_release_version": "786", "last_release_time": "2012-07-05T17:03:14Z"}mediumvirus

threatvault-release-note-get#


Retrieves the release notes information by version.

Base Command#

threatvault-release-note-get

Input#

Argument NameDescriptionRequired
versionThe release version (ex. 8446) or content version (ex. 8446-6886) of the release notes.Required

Context Output#

PathTypeDescription
ThreatVault.ReleaseNote.release_versionStringThe release version of the update.
ThreatVault.ReleaseNote.typeStringThe type of the release notes.
ThreatVault.ReleaseNote.content_versionStringThe content version of the update.
ThreatVault.ReleaseNote.notesArrayGeneral notices and reminders.
ThreatVault.ReleaseNote.decodersArrayThe decoder updates in the release notes.
ThreatVault.ReleaseNote.spyware.newArrayList of new entries.
ThreatVault.ReleaseNote.spyware.modifiedArrayList of modified entries.
ThreatVault.ReleaseNote.spyware.disabledArrayList of disabled entries.
ThreatVault.ReleaseNote.vulnerability.newArrayList of new entries.
ThreatVault.ReleaseNote.vulnerability.modifiedArrayList of modified entries.
ThreatVault.ReleaseNote.vulnerability.disabledArrayList of disabled entries.
ThreatVault.ReleaseNote.applications.newArrayList of new entries.
ThreatVault.ReleaseNote.applications.modifiedArrayList of modified entries.
ThreatVault.ReleaseNote.applications.obsoletedArrayList of obsolete entries.

Command example#

!threatvault-release-note-get version=8615

Context Example#

{
"ThreatVault": {
"ReleaseNote": {
"content_version": "8615-7549",
"release_notes": {
"applications": {
"modified": [],
"new": [],
"obsoleted": []
},
"data_correlation": {
"deleted": [],
"modified": [],
"new": []
},
"decoders": {
"modified": [],
"new": []
},
"file_type": {
"disabled": [],
"modified": [],
"new": []
},
"notes": [
"<p><strong>Reminder:</strong></p><ul><li>(8/23/22) As part of Applications and Threats content update 8609 (released August 17, 2022), we updated the&nbsp;<em data-stringify-type=\"italic\">vmware&nbsp;</em>App-ID to include coverage for VMware traffic that was previously identified using the&nbsp;<em data-stringify-type=\"italic\">ssl</em>&nbsp;App-ID. Please review&nbsp;<a class=\"c-link\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/content-8609-vmware-app-id/ta-p/512741\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/content-8609-vmware-app-id/ta-p/512741' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/content-8609-vmware-app-id/ta-p/512741&lt;/a&gt;\" data-sk=\"tooltip_parent\">this article</a>&nbsp;for details.<br /><br /></li><li>(8/22/22)&nbsp;As part of the&nbsp;<a class=\"c-link\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/app-id-decoders-enhancement-plan/ta-p/469547\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/app-id-decoders-enhancement-plan/ta-p/469547' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/app-id-decoders-enhancement-plan/ta-p/469547&lt;/a&gt;\" data-sk=\"tooltip_parent\" aria-describedby=\"sk-tooltip-5262\">App-ID&trade; decoders improvement process</a>&nbsp;and as announced on 6/30/2022, we released a&nbsp;<strong data-stringify-type=\"bold\"><em data-stringify-type=\"italic\">dns-non-rfc</em></strong>&nbsp;placeholder App-ID (beginning with content update 8586) and we intend to activate the decoder for this App-ID with the content update scheduled for September 20, 2022. Review&nbsp;<a class=\"c-link\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/dns-app-id-enhancement-release-plan/ta-p/487590\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/dns-app-id-enhancement-release-plan/ta-p/487590' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/dns-app-id-enhancement-release-plan/ta-p/487590&lt;/a&gt;\" data-sk=\"tooltip_parent\">this article</a>&nbsp;for details.</li><li><p>(8/17/22) The update for App-IDs associated with Google Drive API traffic is scheduled for the new App-IDs content update on September 20, 2022. Refer to&nbsp;<a class=\"c-link\" tabindex=\"-1\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/app-id-update-for-google-drive-apis/ta-p/504345\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/app-id-update-for-google-drive-apis/ta-p/504345' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/app-id-update-for-google-drive-apis/ta-p/504345&lt;/a&gt;' target='_blank'&gt;&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/app-id-update-for-google-drive-apis/ta-p/504345&lt;' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/app-id-update-for-google-drive-apis/ta-p/504345&lt;&lt;/a&gt;;/a&gt;\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">this article</a>&nbsp;for the details.</p></li><li data-stringify-indent=\"0\" data-stringify-border=\"0\"><p>(8/17/22) We released new placeholder App-IDs for several new OT/ICS App-IDs (FL-net, OpenADR, SafetyNET, and Siemens-S7) in content update version 8609 and we intend to activate these new App-IDs with the new App-IDs content update scheduled for September 20, 2022. (Review&nbsp;<a class=\"c-link\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/release-plan-for-fl-net-openadr-safetynet-and-siemens-s7-app-ids/ta-p/511342\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/release-plan-for-fl-net-openadr-safetynet-and-siemens-s7-app-ids/ta-p/511342' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/release-plan-for-fl-net-openadr-safetynet-and-siemens-s7-app-ids/ta-p/511342&lt;/a&gt;' target='_blank'&gt;&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/release-plan-for-fl-net-openadr-safetynet-and-siemens-s7-app-ids/ta-p/511342&lt;' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/release-plan-for-fl-net-openadr-safetynet-and-siemens-s7-app-ids/ta-p/511342&lt;&lt;/a&gt;;/a&gt;\" data-sk=\"tooltip_parent\">the details here</a>.)</p></li><li data-stringify-indent=\"0\" data-stringify-border=\"0\"><p>(8/17/22) We released a new placeholder App-ID for PsExec traffic in content update version 8609 and we intend to activate this new App-ID, as well, with the new App-IDs content update scheduled for September 20,2022. (Review&nbsp;<a class=\"c-link\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/new-app-id-announcement-psexec/ta-p/508023\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/new-app-id-announcement-psexec/ta-p/508023' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/new-app-id-announcement-psexec/ta-p/508023&lt;/a&gt;' target='_blank'&gt;&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/new-app-id-announcement-psexec/ta-p/508023&lt;' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/new-app-id-announcement-psexec/ta-p/508023&lt;&lt;/a&gt;;/a&gt;\" data-sk=\"tooltip_parent\">the details here</a>.)</p></li><li data-stringify-indent=\"0\" data-stringify-border=\"0\"><p>(8/17/22) We introduced new App-ID tags to help you categorize your application traffic. The first four of these tags (Proxy Avoidance, Uploading, Posting, Editing, Downloading) are included content update version 8609 and we will continue to introduce one or more of these new App-ID tags in these same monthly content updates where we introduce new App-IDs. Watch these release notes for updates and review&nbsp;<a class=\"c-link\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/app-id-new-tags-announcement/ta-p/508005\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/app-id-new-tags-announcement/ta-p/508005' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/app-id-new-tags-announcement/ta-p/508005&lt;/a&gt;' target='_blank'&gt;&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/app-id-new-tags-announcement/ta-p/508005&lt;' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/app-id-new-tags-announcement/ta-p/508005&lt;&lt;/a&gt;;/a&gt;\" data-sk=\"tooltip_parent\">this article for details</a>&nbsp;about upcoming new App-ID tags.</p></li><li data-stringify-indent=\"0\" data-stringify-border=\"0\">(7/11/22; updated 8/1/22) As part of the&nbsp;<a class=\"c-link\" tabindex=\"-1\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/app-id-decoders-enhancement-plan/ta-p/469547\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/app-id-decoders-enhancement-plan/ta-p/469547' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/app-id-decoders-enhancement-plan/ta-p/469547&lt;/a&gt;\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">App-ID&trade; decoders improvement process</a>, we will modify the&nbsp;<strong data-stringify-type=\"bold\"><em data-stringify-type=\"italic\">smtp&nbsp;</em></strong>App-ID. As announced on 7/11/2022, we intend to release an&nbsp;<strong data-stringify-type=\"bold\"><em data-stringify-type=\"italic\">smtp-non-rfc</em></strong>&nbsp;placeholder App-ID but now intend to do this with the Applications and Threats content update scheduled for September 20, 2022, and will then activate the decoder for this App-ID with the content update scheduled for October 18, 2022. Review&nbsp;<a class=\"c-link\" tabindex=\"-1\" href=\"https://live.paloaltonetworks.com/t5/customer-resources/smtp-app-id-enhancement-release-plan/ta-p/508224\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"&lt;a href='https://live.paloaltonetworks.com/t5/customer-resources/smtp-app-id-enhancement-release-plan/ta-p/508224' target='_blank'&gt;https://live.paloaltonetworks.com/t5/customer-resources/smtp-app-id-enhancement-release-plan/ta-p/508224&lt;/a&gt;\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">this article</a>&nbsp;for the details.</li></ul>"
],
"spyware": {
"disabled": [],
"modified": [
{
"action": "reset-both",
"attack_name": "Manuscrypt Command and Control Traffic Detection",
"category": "command-and-control",
"change_data": "improved detection logic to address a possible fp issue",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 86322,
"severity": "critical"
}
],
"new": [
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22059,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22060,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22061,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22062,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22063,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22064,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22065,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22066,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22067,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22068,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22069,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22070,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22071,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22072,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22073,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22074,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22075,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22076,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22077,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Pastebin Command and Control Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 22078,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "Manjusaka Default Command and Control Traffic Detection",
"category": "hacktool",
"change_data": "improved detection logic to cover a new c2 variant",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 86663,
"severity": "critical"
},
{
"action": "reset-both",
"attack_name": "SocGholish Malware Download Traffic Detection",
"category": "spyware",
"change_data": "new coverage",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 86664,
"severity": "critical"
}
]
},
"vulnerability": {
"disabled": [],
"modified": [
{
"action": "reset-both",
"attack_name": "Microsoft PowerPoint Presentation Buffer Overrun RCE Vulnerability",
"category": "code-execution",
"change_data": "improved detection logic to address a possible fp issue",
"cve": "CVE-2011-1270",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 33951,
"severity": "high",
"vendor": "MS11-036"
},
{
"action": "reset-server",
"attack_name": "Nagios XI SQL Injection Vulnerability",
"category": "code-execution",
"change_data": "improved detection logic to cover a new exploit",
"cve": "CVE-2021-37350",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 91633,
"severity": "critical",
"vendor": ""
},
{
"action": "reset-server",
"attack_name": "Jolokia Agent JNDI Injection Vulnerability",
"category": "code-execution",
"change_data": "improved detection logic to cover a new exploit",
"cve": "CVE-2018-1000130",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92364,
"severity": "high",
"vendor": ""
},
{
"action": "reset-server",
"attack_name": "Microsoft Exchange Server Remote Code Execution Vulnerability",
"category": "code-execution",
"change_data": "improved detection logic to cover a new exploit",
"cve": "CVE-2022-23277",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92903,
"severity": "high",
"vendor": ""
}
],
"new": [
{
"action": "reset-server",
"attack_name": "H3C IMC Intelligent Management Center Remote Code Execution Vulnerability",
"category": "code-execution",
"change_data": "new coverage",
"cve": "",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92955,
"severity": "medium",
"vendor": ""
},
{
"action": "reset-both",
"attack_name": "Apache APISIX Remote Code Execution Vulnerability",
"category": "code-execution",
"change_data": "improved detection logic to cover a new exploit",
"cve": "CVE-2022-24112",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92980,
"severity": "critical",
"vendor": ""
},
{
"action": "alert",
"attack_name": "Ivanti Avalanche Web Server authenticate Authentication Bypass Vulnerability",
"category": "code-execution",
"change_data": "new coverage",
"cve": "CVE-2022-36980",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92996,
"severity": "medium",
"vendor": ""
},
{
"action": "reset-server",
"attack_name": "Microsoft HTTP Protocol Stack Remote Code Execution Vulnerability",
"category": "code-execution",
"change_data": "new coverage",
"cve": "CVE-2022-21907",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92998,
"severity": "critical",
"vendor": ""
},
{
"action": "reset-both",
"attack_name": "PHP-Proxy Local File Inclusion Vulnerability",
"category": "info-leak",
"change_data": "improved detection logic to cover a new exploit",
"cve": "CVE-2018-19246",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 92999,
"severity": "high",
"vendor": ""
},
{
"action": "reset-both",
"attack_name": "Mozilla Firefox Prototype Pollution Vulnerability",
"category": "code-execution",
"change_data": "new coverage",
"cve": "CVE-2022-1802",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 93002,
"severity": "high",
"vendor": ""
},
{
"action": "reset-server",
"attack_name": "Open Web Analytics Remote Code Execution Vulnerability",
"category": "code-execution",
"change_data": "new coverage",
"cve": "CVE-2022-24637",
"max_version": "",
"min_version": "8.1.0",
"pan_id": 93014,
"severity": "critical",
"vendor": ""
}
]
}
},
"release_time": "2022-09-01T17:04:33Z",
"release_version": 8615,
"type": "content"
}
}
}

Human Readable Output#

Release notes:#

Content versionDisabled SpywareModified SpywareModified VulnerabilityNew SpywareNew VulnerabilityNotesRelease timeRelease versiontype
8615-7549{'severity': 'critical', 'pan_id': 86322, 'attack_name': 'Manuscrypt Command and Control Traffic Detection', 'category': 'command-and-control', 'action': 'reset-both', 'change_data': 'improved detection logic to address a possible fp issue', 'min_version': '8.1.0', 'max_version': ''}{'severity': 'critical', 'pan_id': 86322, 'attack_name': 'Manuscrypt Command and Control Traffic Detection', 'category': 'command-and-control', 'action': 'reset-both', 'change_data': 'improved detection logic to address a possible fp issue', 'min_version': '8.1.0', 'max_version': ''}severity: high
pan_id: 33951
attack_name: Microsoft PowerPoint Presentation Buffer Overrun RCE Vulnerability
cve: CVE-2011-1270
vendor: MS11-036
category: code-execution
action: reset-both
change_data: improved detection logic to address a possible fp issue
min_version: 8.1.0
max_version:
{'severity': 'critical', 'pan_id': 22059, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22060, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22061, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22062, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22063, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22064, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22065, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22066, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22067, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22068, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22069, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22070, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22071, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22072, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22073, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22074, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22075, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22076, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22077, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 22078, 'attack_name': 'Pastebin Command and Control Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 86663, 'attack_name': 'Manjusaka Default Command and Control Traffic Detection', 'category': 'hacktool', 'action': 'reset-both', 'change_data': 'improved detection logic to cover a new c2 variant', 'min_version': '8.1.0', 'max_version': ''},
{'severity': 'critical', 'pan_id': 86664, 'attack_name': 'SocGholish Malware Download Traffic Detection', 'category': 'spyware', 'action': 'reset-both', 'change_data': 'new coverage', 'min_version': '8.1.0', 'max_version': ''}
severity: medium
pan_id: 92955
attack_name: H3C IMC Intelligent Management Center Remote Code Execution Vulnerability
cve:
vendor:
category: code-execution
action: reset-server
change_data: new coverage
min_version: 8.1.0
max_version:

Reminder:

  • (8/23/22) As part of Applications and Threats content update 8609 (released August 17, 2022), we updated the vmware App-ID to include coverage for VMware traffic that was previously identified using the ssl App-ID. Please review this article for details.

  • (8/22/22) As part of the App-IDâ„¢ decoders improvement process and as announced on 6/30/2022, we released a dns-non-rfc placeholder App-ID (beginning with content update 8586) and we intend to activate the decoder for this App-ID with the content update scheduled for September 20, 2022. Review this article for details.
  • (8/17/22) The update for App-IDs associated with Google Drive API traffic is scheduled for the new App-IDs content update on September 20, 2022. Refer to this article for the details.

  • (8/17/22) We released new placeholder App-IDs for several new OT/ICS App-IDs (FL-net, OpenADR, SafetyNET, and Siemens-S7) in content update version 8609 and we intend to activate these new App-IDs with the new App-IDs content update scheduled for September 20, 2022. (Review the details here.)

  • (8/17/22) We released a new placeholder App-ID for PsExec traffic in content update version 8609 and we intend to activate this new App-ID, as well, with the new App-IDs content update scheduled for September 20,2022. (Review the details here.)

  • (8/17/22) We introduced new App-ID tags to help you categorize your application traffic. The first four of these tags (Proxy Avoidance, Uploading, Posting, Editing, Downloading) are included content update version 8609 and we will continue to introduce one or more of these new App-ID tags in these same monthly content updates where we introduce new App-IDs. Watch these release notes for updates and review this article for details about upcoming new App-ID tags.

  • (7/11/22; updated 8/1/22) As part of the App-IDâ„¢ decoders improvement process, we will modify the smtp App-ID. As announced on 7/11/2022, we intend to release an smtp-non-rfc placeholder App-ID but now intend to do this with the Applications and Threats content update scheduled for September 20, 2022, and will then activate the decoder for this App-ID with the content update scheduled for October 18, 2022. Review this article for the details.
2022-09-01T17:04:33Z8615content

threatvault-threat-batch-search#


Retrieves the threats signature metadata by ID, name, or sample hash (sha256 or md5) in batch mode. Batch limit is 100 entries.

Base Command#

threatvault-threat-batch-search

Input#

Argument NameDescriptionRequired
idThe signature IDs.Optional
md5The hash of the sample.Optional
nameThe signature names.Optional
sha256The hash of the sample.Optional
typeUse together with the other fields to filter out the results. Possible values are: ips, fileformat, spyware, vulnerability, antivirus, dns, rtdns, spywarec2.Optional

Context Output#

PathTypeDescription
ThreatVault.Vulnerability.idStringThe unique ID of the threat.
ThreatVault.Vulnerability.nameStringThe name of the threat.
ThreatVault.Vulnerability.descriptionStringThe description of the threat.
ThreatVault.Vulnerability.categoryStringThe threat category of the threat.
ThreatVault.Vulnerability.min_versionStringThe PAN-OS minimum version.
ThreatVault.Vulnerability.max_versionStringThe PAN-OS maximum version.
ThreatVault.Vulnerability.severityStringThe severity of the threat.
ThreatVault.Vulnerability.default_actionStringThe default action when the signature is triggered.
ThreatVault.Vulnerability.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Vulnerability.vendor.ArrayThe vulnerability identifier issued by the vendor on advisories.
ThreatVault.Vulnerability.referenceArrayThe public reference of the threat.
ThreatVault.Vulnerability.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Vulnerability.detailsObjectAny additional details of the threat.
ThreatVault.Vulnerability.ori_release_versionStringThe original release version of the threat.
ThreatVault.Vulnerability.latest_release_versionStringThe latest release version of the threat.
ThreatVault.Vulnerability.ori_release_timeStringThe original release time of the threat.
ThreatVault.Vulnerability.latest_release_timeStringThe latest release time of the threat.
ThreatVault.Antivirus.idStringThe unique ID of the threat.
ThreatVault.Antivirus.nameStringThe name of the threat.
ThreatVault.Antivirus.actionStringThe action of the threat.
ThreatVault.Antivirus.descriptionStringThe description of the threat.
ThreatVault.Antivirus.subtypeStringThe subtype of the threat.
ThreatVault.Antivirus.typeStringThe type of the threat.
ThreatVault.Antivirus.create_timeStringThe create time of the threat.
ThreatVault.Antivirus.related_sha256_hashesStringThe related SHA256 hashes of the threat.
ThreatVault.Antivirus.releaseStringInformation about the signature release.
ThreatVault.FileInfo.filetypeStringThe file type of the file.
ThreatVault.FileInfo.sha256StringThe SHA256 of the file.
ThreatVault.FileInfo.sha1StringThe SHA1 of the file.
ThreatVault.FileInfo.md5StringThe MD5 of the file.
ThreatVault.FileInfo.sizeStringThe size of the file.
ThreatVault.FileInfo.typeStringThe type of the file.
ThreatVault.FileInfo.familyStringThe family of the file.
ThreatVault.FileInfo.platformStringThe platform of the file.
ThreatVault.FileInfo.wildfire_verdictStringThe Wildfire verdict.
ThreatVault.FileInfo.create_timeStringThe threat signature creation time.
ThreatVault.FileInfo.signaturesStringThe signatures.
ThreatVault.Spyware.idStringThe unique ID of the threat.
ThreatVault.Spyware.nameStringThe name of the threat.
ThreatVault.Spyware.descriptionStringThe description of the threat.
ThreatVault.Spyware.vendorArrayThe spyware identifier issued by the vendor on advisories.
ThreatVault.Spyware.severityStringThe severity of the threat.
ThreatVault.Spyware.default_actionStringThe default action when the signature is triggered.
ThreatVault.Spyware.detailsObjectAny additional details of the threat.
ThreatVault.Spyware.referenceArrayThe public reference of the threat.
ThreatVault.Spyware.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Spyware.min_versionStringThe PAN-OS minimum version.
ThreatVault.Spyware.max_versionStringThe PAN-OS maximum version.
ThreatVault.Spyware.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.DNS.idStringThe unique ID of the threat.
ThreatVault.DNS.nameStringThe name of the threat.
ThreatVault.DNS.descriptionStringThe description of the threat.
ThreatVault.DNS.typeStringThe type of the threat.
ThreatVault.DNS.severityStringThe severity of the threat.
ThreatVault.DNS.subtypeStringThe subtype of the threat.
ThreatVault.DNS.actionStringThe action of the threat.
ThreatVault.DNS.create_timeStringThe threat signature creation time.
ThreatVault.DNS.releaseStringInformation about the signature release.
ThreatVault.DNS.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.RTDNS.idStringThe unique ID of the threat.
ThreatVault.RTDNS.nameStringThe name of the threat.
ThreatVault.RTDNS.descriptionStringThe description of the threat.
ThreatVault.RTDNS.typeStringThe type of the threat.
ThreatVault.RTDNS.severityStringThe severity of the threat.
ThreatVault.RTDNS.subtypeStringThe subtype of the threat.
ThreatVault.RTDNS.actionStringThe action of the threat.
ThreatVault.RTDNS.create_timeStringThe threat signature creation time.
ThreatVault.RTDNS.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.SpywareC2.idStringThe unique ID of the threat.
ThreatVault.SpywareC2.nameStringThe name of the threat.
ThreatVault.SpywareC2.descriptionStringThe description of the threat.
ThreatVault.SpywareC2.typeStringThe type of the threat.
ThreatVault.SpywareC2.severityStringThe severity of the threat.
ThreatVault.SpywareC2.subtypeStringThe subtype of the threat.
ThreatVault.SpywareC2.actionStringThe action of the threat.
ThreatVault.SpywareC2.create_timeStringThe threat signature creation time.
ThreatVault.SpywareC2.releaseStringInformation about the signature release.
ThreatVault.SpywareC2.statusStringThe status of the threat (e.g., inactive, active, or released).

Command example#

!threatvault-threat-batch-search sha256=380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549

Context Example#

{
"DBotScore": {
"Indicator": "380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549",
"Reliability": "D - Not usually reliable",
"Score": 3,
"Type": "file",
"Vendor": "Palo Alto Networks Threat Vault v2"
},
"File": {
"Hashes": [
{
"type": "MD5",
"value": "ca066f965dfbc5392871d3fa281236cf"
},
{
"type": "SHA1",
"value": "d58869fb948c60bef544e1a36f4489fd76fd10ae"
},
{
"type": "SHA256",
"value": "380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549"
}
],
"MD5": "ca066f965dfbc5392871d3fa281236cf",
"Malicious": {
"Description": null,
"Vendor": "Palo Alto Networks Threat Vault v2"
},
"SHA1": "d58869fb948c60bef544e1a36f4489fd76fd10ae",
"SHA256": "380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549"
},
"ThreatVault": {
"FileInfo": {
"create_time": "2021-12-02T20:27:12Z",
"family": "WGeneric",
"filetype": "DLL",
"md5": "ca066f965dfbc5392871d3fa281236cf",
"platform": "Win32",
"sha1": "d58869fb948c60bef544e1a36f4489fd76fd10ae",
"sha256": "380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549",
"signatures": {
"antivirus": [
{
"action": "",
"create_time": "2019-06-19T17:06:12Z",
"description": "This signature detected trojan/Win32 DLL.razy.slo",
"id": "280392504",
"name": "trojan/Win32 DLL.razy.slo",
"related_sha256_hashes": [
"5c825eae80aa0f376626387193c8ededa445cb066ca36813c7af49428e372cfb",
"d4a06653ad6d25ab69595c69656ce4c7f8ec60874b77998777fed7e741ad7003",
"88a5a664dbd3459b4fd1e55e450786c493989b994606d7b8cbe589fb9358dd74",
"4977929b742a47fafd4e4d0e2b765428ce8ec2764a4463d083914b30aa4d3a1b",
"0b66779d8910e365c8de5ea030f9827ee32b418bc303c26e3252a4843b86118d",
"3b3d767226aa796013b075fd7d6baa432e3f2bf380c55655dedaa8ead038829e",
"b8cbc5c1b01ae17dec42eca0f4b448407a2d5b9f85580e0e122c1854f4f80e37",
"47e3da7e179b755a1ccc8fe8fc506a2fb15baff2c124b15cf2f5e29038f3d1ac",
"5cd3e058f6049a31a42c292ebb091a1b5ea4bd9c7bc6fed5ac8a33c5fc89924a",
"4a2b514a753611b464e7583ba512310cd58c8066f19b631134012ebe05cd0e5f"
],
"release": {
"antivirus": {
"first_release_time": "2019-06-21T13:37:09Z",
"first_release_version": "3017",
"last_release_time": "2022-11-05T11:36:34Z",
"last_release_version": "4258"
},
"wildfire": {
"first_release_time": "2019-06-19T17:06:35Z",
"first_release_version": "359199",
"last_release_time": "2022-11-06T12:47:08Z",
"last_release_version": "713954"
}
},
"severity": "medium",
"status": "active",
"subtype": "virus",
"type": "0"
}
]
},
"size": "176128",
"type": "Virus",
"wildfire_verdict": "malicious"
}
}
}

Human Readable Output#

File 380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549:#

ActiveCreateTimeDescriptionFamilyFileTypeMD5PlatformReleaseSHA1SHA256SeveritySignature NameSignatureIdSizeWildfire verdict
active2021-12-02T20:27:12ZThis signature detected trojan/Win32 DLL.razy.sloWGenericDLLca066f965dfbc5392871d3fa281236cfWin32antivirus: {"first_release_version": "3017", "first_release_time": "2019-06-21T13:37:09Z", "last_release_version": "4258", "last_release_time": "2022-11-05T11:36:34Z"}
wildfire: {"first_release_version": "359199", "first_release_time": "2019-06-19T17:06:35Z", "last_release_version": "713954", "last_release_time": "2022-11-06T12:47:08Z"}
d58869fb948c60bef544e1a36f4489fd76fd10ae380082fbf9e57bcd524648efce14c92a4cb58cb745c30ef29730959d79164549mediumtrojan/Win32 DLL.razy.slo280392504176128malicious

threatvault-threat-search#


Retrieves threat metadata. The nature of the query is determined by the query parameter you provide.

Base Command#

threatvault-threat-search

Input#

Argument NameDescriptionRequired
cveThe CVE tied to the signature.Optional
vendorThe vendor ID tied to the signatures.Optional
signature-nameThe signature name.Optional
from-release-dateThe release dates range (use with the to-release-date argument), Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year).Optional
to-release-dateThe right boundary of date range query (use with the from-release-date argument), Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year).Optional
from-release-versionThe release versions range (use with the to-release-version argument).Optional
to-release-versionThe right boundary of version range query (use with the from-release-version argument).Optional
release-dateThe release date. Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year).Optional
release-versionThe release version.Optional
typeThe threat type. Use together with the other fields to filter out the results. Possible values are: ips, fileformat, spyware, vulnerability, antivirus, dns, rtdns, spywarec2.Optional
pagePage number to get result from. Needs to be use with the page_size argument.Optional
page_sizeThe page size of the returned results. Needs to be use with the page argument.Optional
limitThe maximum number of results to return (default is 50).Optional

Context Output#

PathTypeDescription
ThreatVault.Vulnerability.idStringThe unique ID of the threat.
ThreatVault.Vulnerability.nameStringThe name of the threat.
ThreatVault.Vulnerability.descriptionStringThe description of the threat.
ThreatVault.Vulnerability.categoryStringThe threat category of the threat.
ThreatVault.Vulnerability.min_versionStringThe PAN-OS minimum version.
ThreatVault.Vulnerability.max_versionStringThe PAN-OS maximum version.
ThreatVault.Vulnerability.severityStringThe severity of the threat.
ThreatVault.Vulnerability.default_actionStringThe default action when the signature is triggered.
ThreatVault.Vulnerability.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Vulnerability.vendor.ArrayThe vulnerability identifier issued by the vendor on advisories.
ThreatVault.Vulnerability.referenceArrayThe public reference of the threat.
ThreatVault.Vulnerability.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Vulnerability.detailsObjectAny additional details of the threat.
ThreatVault.Vulnerability.ori_release_versionStringThe original release version of the threat.
ThreatVault.Vulnerability.latest_release_versionStringThe latest release version of the threat.
ThreatVault.Vulnerability.ori_release_timeStringThe original release time of the threat.
ThreatVault.Vulnerability.latest_release_timeStringThe latest release time of the threat.
ThreatVault.Spyware.idStringThe unique ID of the threat.
ThreatVault.Spyware.nameStringThe name of the threat.
ThreatVault.Spyware.descriptionStringThe description of the threat.
ThreatVault.Spyware.vendorArrayThe spyware identifier issued by the vendor on advisories.
ThreatVault.Spyware.severityStringThe severity of the threat.
ThreatVault.Spyware.default_actionStringThe default action when the signature is triggered.
ThreatVault.Spyware.detailsObjectAny additional details of the threat.
ThreatVault.Spyware.referenceArrayThe public reference of the threat.
ThreatVault.Spyware.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Spyware.min_versionStringThe PAN-OS minimum version.
ThreatVault.Spyware.max_versionStringThe PAN-OS maximum version.
ThreatVault.Spyware.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Antivirus.idStringThe unique ID of the threat.
ThreatVault.Antivirus.nameStringThe name of the threat.
ThreatVault.Antivirus.actionStringThe action of the threat.
ThreatVault.Antivirus.descriptionStringThe description of the threat.
ThreatVault.Antivirus.subtypeStringThe subtype of the threat.
ThreatVault.Antivirus.typeStringThe type of the threat.
ThreatVault.Antivirus.create_timeStringThe create time of the threat.
ThreatVault.Antivirus.related_sha256_hashesStringThe related SHA256 hashes of the threat.
ThreatVault.Antivirus.releaseStringInformation about the signature release.
ThreatVault.Fileformat.idStringThe unique ID of the threat.
ThreatVault.Fileformat.nameStringThe name of the threat.
ThreatVault.Fileformat.descriptionStringThe description of the threat.
ThreatVault.Fileformat.categoryStringThe threat category of the threat.
ThreatVault.Fileformat.min_versionStringThe PAN-OS minimum version.
ThreatVault.Fileformat.max_versionStringThe PAN-OS maximum version.
ThreatVault.Fileformat.severityStringThe severity of the threat.
ThreatVault.Fileformat.default_actionStringThe default action when the signature is triggered.
ThreatVault.Fileformat.cveArrayThe CVE (Common Vulnerabilities and Exposures) of the threat.
ThreatVault.Fileformat.vendorArrayThe file format identifier issued by the vendor on advisories.
ThreatVault.Fileformat.referenceArrayThe public reference of the threat.
ThreatVault.Fileformat.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.Fileformat.detailsArrayAny additional details of the threat.
ThreatVault.Fileformat.ori_release_versionStringThe original release version of the threat.
ThreatVault.Fileformat.latest_release_versionStringThe latest release version of the threat.
ThreatVault.Fileformat.ori_release_timeStringThe original release time of the threat.
ThreatVault.Fileformat.latest_release_timeStringThe latest release time of the threat.
ThreatVault.DNS.idStringThe unique ID of the threat.
ThreatVault.DNS.nameStringThe name of the threat.
ThreatVault.DNS.descriptionStringThe description of the threat.
ThreatVault.DNS.typeStringThe type of the threat.
ThreatVault.DNS.severityStringThe severity of the threat.
ThreatVault.DNS.subtypeStringThe subtype of the threat.
ThreatVault.DNS.actionStringThe action of the threat.
ThreatVault.DNS.create_timeStringThe threat signature creation time.
ThreatVault.DNS.releaseStringInformation about the signature release.
ThreatVault.DNS.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.RTDNS.idStringThe unique ID of the threat.
ThreatVault.RTDNS.nameStringThe name of the threat.
ThreatVault.RTDNS.descriptionStringThe description of the threat.
ThreatVault.RTDNS.typeStringThe type of the threat.
ThreatVault.RTDNS.severityStringThe severity of the threat.
ThreatVault.RTDNS.subtypeStringThe subtype of the threat.
ThreatVault.RTDNS.actionStringThe action of the threat.
ThreatVault.RTDNS.create_timeStringThe threat signature creation time.
ThreatVault.RTDNS.statusStringThe status of the threat (e.g., inactive, active, or released).
ThreatVault.SpywareC2.idStringThe unique ID of the threat.
ThreatVault.SpywareC2.nameStringThe name of the threat.
ThreatVault.SpywareC2.descriptionStringThe description of the threat.
ThreatVault.SpywareC2.typeStringThe type of the threat.
ThreatVault.SpywareC2.severityStringThe severity of the threat.
ThreatVault.SpywareC2.subtypeStringThe subtype of the threat.
ThreatVault.SpywareC2.actionStringThe action of the threat.
ThreatVault.SpywareC2.create_timeStringThe threat signature creation time.
ThreatVault.SpywareC2.releaseStringInformation about the signature release.
ThreatVault.SpywareC2.statusStringThe status of the threat (e.g., inactive, active, or released).

Command example#

!threatvault-threat-search signature-name=Code+Injection+JS

Context Example#

{
"ThreatVault": {
"Vulnerability": {
"category": "code-execution",
"cve": [
"CVE-2020-28502"
],
"default_action": "alert",
"description": "Node.js is prone to a code injection vulnerability while parsing certain crafted HTTP requests. The vulnerability is due to the lack of proper checks on HTTP requests, leading to an exploitable code injection vulnerability. An attacker could exploit the vulnerability by sending crafted HTTP requests. A successful attack could lead to remote code execution with the privileges of the server.",
"details": {
"change_data": "new coverage"
},
"id": "91119",
"latest_release_time": "2021-05-14T05:00:11Z",
"latest_release_version": "8406",
"max_version": "",
"min_version": "8.1.0",
"name": "Node.js Code Injection Vulnerability",
"ori_release_time": "2021-05-14T05:00:11Z",
"ori_release_version": "8406",
"reference": [
"https://github.com/s-index/CVE-2020-28502"
],
"severity": "high",
"status": "released",
"vendor": []
}
}
}

Human Readable Output#

91119 vulnerability reputation:#

CVECategoryDefault actionIDLatest release timeLatest release versionNameOri release timeOri release versionReferenceSeverityStatus
CVE-2020-28502code-executionalert911192021-05-14T05:00:11Z8406Node.js Code Injection Vulnerability2021-05-14T05:00:11Z8406https://github.com/s-index/CVE-2020-28502highreleased

Breaking changes from the previous version of this integration - Palo Alto Networks Threat Vault v2#

The following sections list the changes in this version.

Commands#

The following commands were removed in this version:

  • threatvault-antivirus-signature-get - replaced by threatvault-threat-signature-get.
  • threatvault-dns-signature-get-by-id.
  • threatvault-antispyware-signature-get-by-id - replaced by threatvault-threat-signature-get.
  • threatvault-ip-geo-get.
  • ip.
  • threatvault-antivirus-signature-search - replaced by threatvault-threat-signature-search.
  • threatvault-dns-signature-search - replaced by threatvault-threat-signature-search.
  • threatvault-antispyware-signature-search - replaced by threatvault-threat-signature-search.
  • threatvault-signature-search-results.

threatvault-atp-batch-report-get#


Retrieve the Advanced Threat Prevention (ATP) report by report id in batch mode. Batch limit is 100 entries. Get one or more ATP reports. Must provide one or more report IDs

Base Command#

threatvault-atp-batch-report-get

Input#

Argument NameDescriptionRequired
report_idProvides the ATP report by matching the report id .Required

Context Output#

PathTypeDescription
ThreatVault.ATP.ReportstringThreatVault ATP Report ID
ThreatVault.ATP.Report.err_msgstringThreatVault error message
ThreatVault.ATP.Report.panos_info.csp_idstringATP Report CSP
ThreatVault.ATP.Report.panos_info.fw_addr_v4stringATP Report firewall IP
ThreatVault.ATP.Report.panos_info.fw_app_versionstringATP Report content version
ThreatVault.ATP.Report.panos_info.fw_hostnamestringATP Report firewall name
ThreatVault.ATP.Report.panos_info.fw_modelstringATP Report firewall model
ThreatVault.ATP.Report.panos_info.fw_sw_versionstringATP Report firewall PAN-OS
ThreatVault.ATP.Report.report_idstringATP Report ID
ThreatVault.ATP.Report.session_info.flow_info.daddrstringATP Report Session Flow destination IP
ThreatVault.ATP.Report.session_info.flow_info.dportstringATP Report Session Flow destination Port
ThreatVault.ATP.Report.session_info.flow_info.saddrstringATP Report Session Flow source IP
ThreatVault.ATP.Report.session_info.flow_info.sportstringATP Report Session Flow source Port
ThreatVault.ATP.Report.session_info.session_idstringATP Report session ID
ThreatVault.ATP.Report.session_info.session_timestampstringATP Report session timestamp
ThreatVault.ATP.Report.transaction_data.payload_sha256stringATP Report transaction payload sha256
ThreatVault.ATP.Report.transaction_data.transaction_idstringATP Report transaction payload ID
ThreatVault.ATP.Report.transaction_data.detection_results.verdictstringATP Report transaction verdict
ThreatVault.ATP.Report.transaction_data.detection_results.detection_servicestringATP Report transaction detection service
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.MethodstringATP Report transaction payload method
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.User-AgentstringATP Report transaction payload user-agent
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.CookiestringATP Report transaction payload cookie
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.AcceptstringATP Report transaction payload accept
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.HoststringATP Report transaction payload host
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.URIstringATP Report transaction payload URI
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.Cache-ControlstringATP Report transaction payload cache-control
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.VersionstringATP Report transaction payload version
ThreatVault.ATP.Report.transaction_data.detection_results.details.payload_info.ConnectionstringATP Report transaction payload connection

Command example#

!threatvault-atp-batch-report-get report_id="a3b93da98349831c5c477370bb352e6b2a75b91c4996b402542b1094b39feff800a"

Context Example#

{
"ThreatVault": {
"ATP": {
"Report": {
"err_msg": "",
"panos_info": {
"csp_id": "123456",
"fw_addr_v4": "192.168.2.46",
"fw_app_version": "8662-7785",
"fw_hostname": "vm50",
"fw_model": "PA-VM",
"fw_serial": "12345678",
"fw_sw_version": "10.2.3"
},
"report_id": "a3b93da98349831c5c477370bb352e6b2a75b91c4996b402542b1094b39feff800a",
"session_info": {
"flow_info": {
"daddr": "1.2.3.4",
"dport": "80",
"saddr": "4.3.2.1",
"sport": "55437"
},
"session_id": "289",
"session_timestamp": "2023-01-11T19:11:11Z"
},
"transaction_data": [
{
"detection_results": [
{
"details": {
"payload_info": {
"Accept": "*/*",
"Cache-Control": "no-cache",
"Connection": "Keep-Alive",
"Cookie": "fH9DkfzA8HcEpU2cjbeyzGkckEEgP8keITqyztlb2DQAc0KEoNy/XqlI0F8PmdPpn5n2kXdQgqg5/wrEIaGd421084U=",
"Host": "1.2.3.4",
"Method": "GET",
"URI": "/visit.js",
"User-Agent": "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)",
"Version": "HTTP/1.1"
}
},
"detection_service": "Cobalt Strike HTTP",
"verdict": 1
}
],
"payload_sha256": "b595e79f6420db35632c23d49ca287bc07690456ea61fb5d9c9896fd9aceecd9",
"transaction_id": 0
}
]
}
}
}
}

Human Readable Output#

Advanced Threat Prevention Report ID: a3b93da98349831c5c477370bb352e6b2a75b91c4996b402542b1094b39feff800a#

|panos_info|fw_hostname: abc\nfw_addr_v4: 192.168.2.1\nfw_app_version: 8662-7785\nfw_sw_version: 10.2.3| |report_id|a3b93da98349831c5c477370bb352e6b2a75b91c4996b402542b1094b39feff800a| |sesion_info|session_id: 289\nsession_timestamp: 2023-01-11T19:11:11z| |transaction_data|{'transaction_id: 0, 'payload_sha256':'b595e79f6420db35632c23d49ca287bc07690456ea61fb5d9c9896fd9aceecd9', 'detection_results': [{'detection_service': 'Cobalt strike HTTP'}] }|

threatvault-atp-report-pcap-get#


Retrieve the Advanced Threat Prevention (ATP) analysis report PCAP by reportID

Base Command#

threatvault-atp-report-pcap-get

Input#

Argument NameDescriptionRequired
report_idRetrieve the ATP report sample (packet capture) by report id.Required

Context Output#

PathTypeDescription
ThreatVault.ATP.PCAP.IDstringThreatvault ATP PCAP ID
ThreatVault.ATP.PCAP.NamestringThreatvault ATP PCAP Name

Command example#

!threatvault-atp-report-pcap-get report_id="5c4b78a92dea9d7bb3171b4f7be131400897fa0e61e6fed9532f2f9de5686b4b"

Context Example#

{
"ThreatVault": {
"ATP": {
"PCAP": {
"ID": "5c4b78a92dea9d7bb3171b4f7be131400897fa0e61e6fed9532f2f9de5686b4b",
"Name": "5c4b78a92dea9d7bb3171b4f7be131400897fa0e61e6fed9532f2f9de5686b4b.pcap"
}
}
}
}

Human Readable Output#

Advanced Threat Prevention PCAP Download:#

|ID|5c4b78a92dea9d7bb3171b4f7be131400897fa0e61e6fed9532f2f9de5686b4b| |Name|5c4b78a92dea9d7bb3171b4f7be131400897fa0e61e6fed9532f2f9de5686b4b.pcap|

Additional Considerations for this version#

Note: The Threat Vault API key is not the same as the Auto Focus API key. Make sure you have the required API key, as instructed on the integration configuration page.