PaloAlto Potential C2 Investigation

PaloAlto Potential C2 Investigation playbook investigates an incident triggered by an IP address that is suspected to be a C2 server.

Trigger - retrieves the information and starts the investigation.

Script - uses Python script to extract information from the incident details. It also extracts a short description of the incident.

API - uses API to extract active incidents with specific short descriptions.

Filter - filters all the closed tickets.

Filter - filters all the open tickets.

Script - uses Python script to extract all the closed and open tickets.

Format - formats the investigation details in a specific format.

If Then - checks for active tickets. If found, it adds information to an existing ticket. If not, it creates a new ticket.

API - uses ServiceNow API to create a new ticket about the incident.

Format - formats the ticket message to a specific syntax.

Script - uses Python script to extract the sys_id.

Parameters - sets the global parameter sys_id to active ticket.

Parameters - sets the global parameter sys_id to new ticket.

API - uses ServiceNow API to update the ticket with new information.

Script - uses Python script to extract the sys_id.

Playbook - runs a sub-playbook MalwareByte Run Scan that investigates IP for malware.

Playbook - runs a sub-playbook IP Reputation Status - Multi Vendor that gives risk score for IP.

Playbook - runs a sub-playbook Set URL Threat Score that gives a risk score for IP.

Playbook - runs a sub-playbook Microsoft Defender Investigation that gives a risk score for IP.

End - returns the investigation result and ends the playbook.

Last updated

Was this helpful?