Skip to main content

Stairwell

Download With Dependencies

Inception is a security intelligence engine that automates the continuous capture, storage, and analysis of executable files.

Stairwell Inception

Inception's APIs leverage auth tokens via the web interface. Directions for generating these tokens, along with API documentation, are available within your Inception tenant.

Not a customer and interested in signing up? You can request access here.

Variant Discovery

  • This command enables rapid, DFIR-level hunts for variants of a provided hash. This hunt will leverage data from your organization, along with Inceptions shared malware corpus.
  • The results will include any variant file hashes discovered, along with a similarity score.

File Enrichment

This command enables instant enrichment of a provided hash. This enrichment will leverage data from your organization, along with Inceptions shared malware corpus.
The results will include:

  • Hash details
  • Seen asset(s)
  • Matching YARA
  • AV verdicts
  • Path/filename details

Stairwell Inception

Inception's APIs leverage auth tokens via the web interface. Directions for generating these tokens, along with API documentation, are available within your Inception tenant.

Not a customer and interested in signing up? You can request access here.

Variant Discovery

  • This command enables rapid, DFIR-level hunts for variants of a provided hash. This hunt will leverage data from your organization, along with Inceptions shared malware corpus.
  • The results will include any variant file hashes discovered, along with a similarity score.

File Enrichment

This command enables instant enrichment of a provided hash. This enrichment will leverage data from your organization, along with Inceptions shared malware corpus.
The results will include:

  • Hash details
  • Seen asset(s)
  • Matching YARA
  • AV verdicts
  • Path/filename details

PUBLISHER

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByPartner
CreatedNovember 9, 2022
Last ReleaseDecember 4, 2024
Malware
Threat Intelligence Management
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.