Skip to main content

Palo Alto Networks - Hunting And Threat Detection

This Playbook is part of the Comprehensive Investigation by Palo Alto Networks Pack.#

This is a multipurpose playbook used for hunting and threat detection. The playbook receives inputs based on hashes, IP addresses, or domain names provided manually or from outputs by other playbooks. The playbook leverages data received by PANW products including, Strata Logging Service, Autofocus and Pan-OS to search for IP addresses, host names and users related to the provided indicators. The output provided by the playbook enables you to find possibly affected IP addresses, users, and endpoints.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • PAN-OS Query Logs For Indicators
  • Convert File Hash to Corresponding Hashes
  • Autofocus Query Samples, Sessions and Tags
  • PAN-OS Query Logs For Indicators
  • Convert file hash to corresponding hashes

Integrations#

This playbook does not use any integrations.

Scripts#

  • IsInternalHostName
  • IsIPInRanges
  • IsIntegrationAvailable
  • SetAndHandleEmpty

Commands#

  • prisma-cloud-network-search
  • cdl-query-traffic-logs
  • cdl-query-url-logs
  • cdl-query-threat-logs
  • xdr-get-alerts

Playbook Inputs#


NameDescriptionDefault ValueRequired
SHA256SHA256 hash of the indicator to hunt.Optional
MD5MD5 hash of the indicator to hunt.Optional
SHA1SHA1 hash of the indicator to hunt.Optional
IPAddressesList of IP addresses.Optional
URLDomainList of domains or urls.Optional
InternalRangeA list of internal IP ranges to check IP addresses against. The list should be provided in CIDR notation, separated by commas. An example of a list of ranges would be: "172.16.0.0/12,10.0.0.0/8,192.168.0.0/16" (without quotes).Optional
InternalDomainNameThe organization's internal domain name. This is provided for the script IsInternalHostName that checks if the detected host names are internal or external if the hosts contain the internal domains suffix. For example demisto.com. If there is more than one domain, use the | character to separate values such as (demisto.com|test.com)Optional
InternalHostRegexThis is provided for the script IsInternalHostName that checks if the detected host names are internal or external. Checks if the hosts match the organization's naming convention. For example the host testpc1 will have the following regex \w{6}\d{1}Optional

Playbook Outputs#


PathDescriptionType
PANWHunting.DetectedUsersUser or array of users that were detected during hunting.string
PANWHunting.DetectedInternalIPsInternal IP addresses detected based on fields and inputs in your search.string
PANWHunting.DetectedExternalIPsExternal IP addresses detected based on fields and inputs in your search.string
PANWHunting.DetectedInternalHostsInternal host names detected based on fields and inputs in your search.string
PANWHunting.DetectedExternalHostsExternal host names detected based on fields and inputs in your search.string

Playbook Image#


Palo Alto Networks - Hunting And Threat Detection