ThreatZone Cortex XSOAR Integration Pack
Threat.Zone enrichments are adaptable and can seamlessly integrate into various playbooks, such as sandbox, static-scan, and CDR playbooks, along with incidents and related files marked as indicators for threat intelligence. The integration now supports URL submissions, granular report retrieval, and richer plan metadata coverage.
Supported commands
tz-sandbox-upload-sampleβ submit files for dynamic analysis with optional module toggles and execution controls.tz-static-upload-sampleβ perform static analysis of files without executing them in the sandbox.tz-cdr-upload-sampleβ sanitize files using ThreatZone CDR workflows.tz-url-analysisβ submit URLs for detonation and reputation assessment.tz-get-resultβ retrieve the submission verdict alongside the raw ThreatZone response payload.tz-get-indicator-resultβ retrieve dynamic behaviour indicators via the dedicated endpoint.tz-get-ioc-resultβ retrieve Indicators of Compromise for a submission using the dedicated API endpoint.tz-get-yara-resultβ retrieve matched YARA rules using the dedicated API endpoint.tz-get-artifact-resultβ retrieve analysis artifacts generated during execution.tz-get-config-resultβ retrieve configuration extractor results exposed by ThreatZone.tz-get-sanitizedβ download the sanitized artifact generated during CDR processing.tz-download-html-reportβ fetch the rendered HTML report for a submission.tz-check-limitsβ inspect current plan quotas, enabled modules, and workspace metadata.
Use tz-get-result details=true to embed inline sections in the readable output, or call the dedicated commands when you need the enriched objects in context.
Ready-to-Use Playbooks
- Analyze File - Sandbox - ThreatZone
- Analyze File - Static Scan - ThreatZone
- Sanitize File - CDR - ThreatZone
- Analyze URL - ThreatZone

