Skip to main content

Strata Logging Service - File Indicators Hunting

This Playbook is part of the Strata Logging Service by Palo Alto Networks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook queries Strata Logging Service (SLS) for file indicators, including SHA256 hashes, file names, and file types.

Note that multiple search values should be separated by commas only (without spaces or any special characters).

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • Strata Logging Service

Scripts#

  • SetAndHandleEmpty

Commands#

  • cdl-query-file-data
  • cdl-query-threat-logs

Playbook Inputs#


NameDescriptionDefault ValueRequired
SHA256A single or multiple SHA256 file hashes to search for within Strata Logging Service.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
FilenameA single or multiple file names to search for within Strata Logging Service.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
FileTypeA single or multiple file types to search for within Strata Logging Service.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
time_rangeAn alternative to the 'start_time' and 'end_time' inputs that indicates the timeframe for the search, e.g. 1 week, 1 day, 30 minutes.

When the time_range input is specified, the 'start_time' and 'end_time' inputs should not be used.
Optional
start_timeSpecify the query start time at which to perform a search within Strata Logging Service.

For example, start_time="2018-04-26 00:00:00"
Optional
end_timeSpecify the query end time at which to perform a search within Strata Logging Service.

For example, end_time="2018-04-26 00:00:00"
Optional
limitThe maximum number of logs to return.
Default is 10.
Optional
fieldsSelect the fields you wish to be included in the query results.
Selection can be "all" (same as *) or a comma-separated list of specific fields in the table.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
FirewallActionFilter network traffic logs that should be retrieved from Strata Logging Service based on firewall action.

Separate multiple search values by commas only (without spaces or any special characters).
Optional
rule_matchedFilter network traffic logs to be retrieved from Strata Logging Service based on security policy rule names that the network traffic matches.

Separate multiple search values by commas only (without spaces or any special characters).
Optional

Playbook Outputs#


PathDescriptionType
CDL.HuntingResultsEvent log objects and fields that were retrieved from Strata Logging Service (SLS).string
CDL.HuntingResults.TimeGeneratedTime when the log was generated on the firewall's data plane.number
CDL.HuntingResults.LogTimeTime the log was received in Strata Logging Service.number
CDL.HuntingResults.IngestionTimeIngestion time of the log.number
CDL.HuntingResults.AppApplication associated with the network traffic.string
CDL.HuntingResults.AppCategoryIdentifies the high-level family of the application.string
CDL.HuntingResults.RiskOfAppIndicates how risky the application is from a network security perspective.string
CDL.HuntingResults.CharacteristicOfAppIdentifies the behavioral characteristic of the application associated with the network traffic.string
CDL.HuntingResults.SanctionedStateOfAppIndicates whether the application has been flagged as sanctioned by the firewall administrator.string
CDL.HuntingResults.SessionIDIdentifies the firewall's internal identifier for a specific network session.string
CDL.HuntingResults.ActionIdentifies the action that the firewall took for the network traffic.string
CDL.HuntingResults.ProtocolIP protocol associated with the session.string
CDL.HuntingResults.SourcePortSource port utilized by the session.number
CDL.HuntingResults.DestinationPortNetwork traffic's destination port. If this value is 0, then the app is using its standard port.number
CDL.HuntingResults.DestinationIPOriginal destination IP address.string
CDL.HuntingResults.SourceIPOriginal source IP address.string
CDL.HuntingResults.UsersSource/Destination user. If neither is available, source_ip is used.string
CDL.HuntingResults.IsPhishingIndicates whether enterprise credentials were submitted by an end user.string
CDL.HuntingResults.SourceLocationSource country or internal region for private addresses.string
CDL.HuntingResults.DestinationLocationDestination country or internal region for private addresses.string
CDL.HuntingResults.RuleMatchedUnique identifier for the security policy rule that the network traffic matched.string
CDL.HuntingResults.ThreatCategoryThreat category of the detected threat.string
CDL.HuntingResults.LogSourceNameName of the source of the log.string
CDL.HuntingResults.DirectionIndicates the direction of the attack.string
CDL.HuntingResults.FileNameThe name of the file that is blocked.string
CDL.HuntingResults.FileSHA256The binary hash (SHA256) of the file.string
CDL.HuntingResults.IsURLDeniedIndicates whether the session was denied due to a URL filtering rule.string
CDL.HuntingResults.URLDomainThe name of the internet domain that was visited in this session.string
CDL.HuntingResults.URLCategoryThe URL category.string
CDL.HuntingResults.SourceDeviceHostHostname of the device from which the session originated.string
CDL.HuntingResults.DestDeviceHostHostname of the device session destination.string

Playbook Image#


Strata Logging Service - File Indicators Hunting