Current ThreatQ Version Filter
 

Palo Alto AutoFocus Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Palo Alto AutoFocus operation enriches ThreatQ indicators with Palo Alto AutoFocus data in the form of attributes and related indicators.

The operation provides the following action:

  • Enrich Indicator - adds data from Palo Alto AutoFocus as attributes or related indicators to the indicator.

The operation is compatible with the following indicator sub-types:

  • Email Address
  • File Name
  • FQDN
  • IP Address
  • IPv6 Address
  • SHA-256
  • URL

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Token Your Palo Alto AutoFocus API Token.  
    Response Size The number of results the user wishes to see.  The default setting is 50.

    The query can return thousands of results.  In order to save time and space, ThreatQuotient recommends limiting the number of results using this parameter. 

    Time Range An optional time range so as to only see query results that were created between the set range. Options include:
    • Today
    • Yesterday
    • Last week
    • Last 6 months

      The bigger the time range is, the longer it may take to load the results.

      If none is selected, it will search during a time range of the last year.

  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The Palo Alto AutoFocus operation provides the following action:

Action Description Object Type Object Subtype
Enrich Indicator Add data from AutoFocus as attributes or related indicators to the indicator Indicators IP Address, IPv6 Address, FQDN, SHA-256, URL, Email Address, Filename

Enrich Indicator

The Enrich Indicator action adds data from Palo Alto AutoFocus as attributes or related indicators to the indicator.

POST https://autofocus.paloaltonetworks.com/api/v1.0/samples/results/<af_cookie>

Sample Response (URL):

{ 
  'af_complete_percentage': 100,
  'tags': {
    'unit42.android_sudo': {
      'tag_name': 'AndroidSudo',
      'up_votes': 2,
      'lasthit': 1620041071000,
      'tag_definition_id': 39972,
      'source': 'Unit 42',
      'tag_groups': [
        {
          'tag_group_name': 'MobileMalware',
          'description': 'Mobile malware is malicious software that targets mobile phones by causing loss or leakage of confidential information. This generic group will encompass all mobile malware, such as Android malware. '
        }
      ],
      'tag_definition_scope_id': 4,
      'description': 'The tag indicates when an Android sample try to execute the "su" command to get root privilege, commonly used to root the phone or otherwise execute code at with root privileges.',
      'customer_industry': 'High Tech',
      'public_tag_name': 'Unit42.AndroidSudo',
      'tag_definition_status_id': 1,
      'support_id': 1,
      'count': 15571072,
      'customer_name': 'Palo Alto Networks Unit42',
      'tag_class_id': 5
    }
  },
  'af_in_progress': False,
  'af_message': 'success',
  'tag_groups': {
    'mobile_malware': {
      'tag_group_name': 'MobileMalware',
      'description': 'Mobile malware is malicious software that targets mobile phones by causing loss or leakage of confidential information. This generic group will encompass all mobile malware, such as Android malware. '
    }
  },
  'af_indices': 0,
  'bucket_info': {
    'daily_points': 5000,
    'minute_points': 200,
    'minute_points_remaining': 199,
    'daily_points_remaining': 4743,
    'daily_bucket_start': '2021-12-27 14:25:34',
    'minute_bucket_start': '2021-12-27 17:24:41'
  },
  'af_first_result_af_took': 0,
  'took': 0,
  'total': 453,
  'af_cookie': 'b2684f3b-6739-11ec-8469-b9c443efd47e',
  'hits': [
    {
      'sort': [],
      '_id': 'ccaa59639974ab56041e45a3a0f86276775a0ef930f938a0b2e93197e7555f8c',
      'visible': True,
      '_source': {
        'tag': ['Unit42.AndroidSudo'],
        'tags': ['35794', '39712', '47735', '66523', '39972', '66328'],
        'create_date': '2021-12-27T09:06:17',
        'source': 11,
        'sha1': 'a527a584f53a15b311c30a381ab26266fc3431df',
        'size': 36705924,
        'malware': 0,
        'sha256': 'ccaa59639974ab56041e45a3a0f86276775a0ef930f938a0b2e93197e7555f8c',
        'filetype': 'Android APK',
        'tag_groups': ['MobileMalware'],
        'filename': 'ccaa59639974ab56041e45a3a0f86276775a0ef930f938a0b2e93197e7555f8c',
        'finish_date': '2021-12-27T09:11:11',
        'app_name': 'CNN',
        'mid': 1205589785551,
        'ispublic': 1,
        'ssdeep': '786432:ice+bvCoUGE5V1fyqPgjZvCEJMYaOPz7JK:J9vaGE1fM3rhK',
        'region': 'us',
        'md5': '26409cc05edecf7b45a5373929062f06',
        'app_packagename': 'com.cnn.mobile.android.phone'
      }
    },
    {
      'sort': [],
      '_id': '329d3d8334b2092ee1dfee4b177c0aa101696331fac9094bc9516e8e499f564c',
      'visible': True,
      '_source': {
        'tag': ['Unit42.AndroidSudo'],
        'tags': ['34418', '84206', '66523', '39972', '1477', '66328'],
        'create_date': '2021-12-27T01:39:15',
        'source': 11,
        'sha1': 'bc870243b7eb469f324b84db63b6163038c2079e',
        'size': 72163782,
        'malware': 0,
        'sha256': '329d3d8334b2092ee1dfee4b177c0aa101696331fac9094bc9516e8e499f564c',
        'filetype': 'Android APK',
        'tag_groups': ['MobileMalware'],
        'filename': '329d3d8334b2092ee1dfee4b177c0aa101696331fac9094bc9516e8e499f564c',
        'finish_date': '2021-12-27T01:43:26',
        'app_name': 'Samsung Internet',
        'mid': 5005614916861,
        'ispublic': 1,
        'ssdeep': '786432:1t7CttFD1JA+EAjmgO9pcroBmapP/S4+xdHt5U:1JkXWTOgY/U',
        'region': 'us',
        'md5': '9db590162b8a52d9d4c74217a73bc0b8',
        'app_packagename': 'com.sec.android.app.sbrowser'
      }
    },
    ...
  ]
}

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples
esponse.hits[]._source.tag[] Attribute Tag Unit42.AndroidSudo
response.hits[]._source.create_date Attribute Create Date 2021-12-27T09:06:17
response.hits[]._source.sha1 Indicator SHA-1 a527a584f53a15b311c30a381
ab26266fc3431df
response.hits[]._source.size Attribute File Size 36705924
response.hits[]._source.malware Attribute Malware 0
response.hits[]._source.sha256 Indicator SHA-256 ccaa59639974ab56041e45a3a0
f86276775a0ef930f938a0b2e93
197e7555f8c
response.hits[]._source.filetype Attribute File Type Android APK
response.hits[]._source.tag_groups Attribute Tag Groups MobileMalware
response.hits[]._source.finish_date Attribute Finish Date 2021-12-27T09:11:11
response.hits[]._source.app_name Attribute App Name CNN
response.hits[]._source.mid Attribute MID 1205589785551
response.hits[]._source.ispublic Attribute isPublic 1
response.hits[]._source.ssdeep Attribute ssdeep 786432:ice+bvCoUGE5V1fyqPgjZvC
EJMYaOPz7JK:J9vaGE1fM3rhK
response.hits[]._source.region Attribute Region US
response.hits[]._source.md5 Indicator MD5 26409cc05edecf7b45a5373929062f06
response.hits[]._source.app_packagename Attribute App Packagename com.cnn.mobile.android.phone

Known Issues / Limitations

  • If you are using a proxy server, verify that you are using a HTTPS proxy.  HTTP is not compatible with the Palo Alto AutoFocus endpoint.  

Change Log

  • Version 1.0.1
    • Added support for proxy use in ThreatQ. The proxy details are located under the Proxy tab of the System Configuration page on the ThreatQ Platform (System Settings > System Configurations).   See the Known Issue / Limitations chapter for more details.  
  • Version 1.0.0
    • Initial Release

PDF Guides

Document ThreatQ Version
Palo Alto AutoFocus Operation Guide v1.0.1 4.40.0 or Greater
Palo Alto AutoFocus Operation Guide v1.0.0 4.40.0 or Greater