Skip to main content

ThreatZone

Download With Dependencies

ThreatZone malware analysis sandboxing

ThreatZone Cortex XSOAR Integration Pack

Threat.Zone enrichments are adaptable and can seamlessly integrate into various playbooks, such as sandbox, static-scan, and CDR playbooks, along with incidents and related files marked as indicators for threat intelligence. The integration now supports URL submissions, granular report retrieval, and richer plan metadata coverage.

Supported commands

  • tz-sandbox-upload-sample β€” submit files for dynamic analysis with optional module toggles and execution controls.
  • tz-static-upload-sample β€” perform static analysis of files without executing them in the sandbox.
  • tz-cdr-upload-sample β€” sanitize files using ThreatZone CDR workflows.
  • tz-url-analysis β€” submit URLs for detonation and reputation assessment.
  • tz-get-result β€” retrieve the submission verdict alongside the raw ThreatZone response payload.
  • tz-get-indicator-result β€” retrieve dynamic behaviour indicators via the dedicated endpoint.
  • tz-get-ioc-result β€” retrieve Indicators of Compromise for a submission using the dedicated API endpoint.
  • tz-get-yara-result β€” retrieve matched YARA rules using the dedicated API endpoint.
  • tz-get-artifact-result β€” retrieve analysis artifacts generated during execution.
  • tz-get-config-result β€” retrieve configuration extractor results exposed by ThreatZone.
  • tz-get-sanitized β€” download the sanitized artifact generated during CDR processing.
  • tz-download-html-report β€” fetch the rendered HTML report for a submission.
  • tz-check-limits β€” inspect current plan quotas, enabled modules, and workspace metadata.

Use tz-get-result details=true to embed inline sections in the readable output, or call the dedicated commands when you need the enriched objects in context.

Ready-to-Use Playbooks

  • Analyze File - Sandbox - ThreatZone
  • Analyze File - Static Scan - ThreatZone
  • Sanitize File - CDR - ThreatZone
  • Analyze URL - ThreatZone

ThreatZone Cortex Integration Pack

Threat.Zone enrichments are adaptable and can seamlessly integrate into various playbooks, such as sandbox, static-scan, and CDR playbooks, along with incidents and related files marked as indicators for threat intelligence. The integration now supports URL submissions, granular report retrieval, and richer plan metadata coverage.

Supported commands

  • tz-sandbox-upload-sample β€” submit files for dynamic analysis with optional module toggles and execution controls.
  • tz-static-upload-sample β€” perform static analysis of files without executing them in the sandbox.
  • tz-cdr-upload-sample β€” sanitize files using ThreatZone CDR workflows.
  • tz-url-analysis β€” submit URLs for detonation and reputation assessment.
  • tz-get-result β€” retrieve the submission verdict alongside the raw ThreatZone response payload.
  • tz-get-indicator-result β€” retrieve dynamic behaviour indicators via the dedicated endpoint.
  • tz-get-ioc-result β€” retrieve Indicators of Compromise for a submission using the dedicated API endpoint.
  • tz-get-yara-result β€” retrieve matched YARA rules using the dedicated API endpoint.
  • tz-get-artifact-result β€” retrieve analysis artifacts generated during execution.
  • tz-get-config-result β€” retrieve configuration extractor results exposed by ThreatZone.
  • tz-get-sanitized β€” download the sanitized artifact generated during CDR processing.
  • tz-download-html-report β€” fetch the rendered HTML report for a submission.
  • tz-check-limits β€” inspect current plan quotas, enabled modules, and workspace metadata.

Use tz-get-result details=true to embed inline sections in the readable output, or call the dedicated commands when you need the enriched objects in context.

Ready-to-Use Playbooks

  • Analyze File - Sandbox - ThreatZone
  • Analyze File - Static Scan - ThreatZone
  • Sanitize File - CDR - ThreatZone
  • Analyze URL - ThreatZone

PUBLISHER

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByPartner
CreatedOctober 23, 2023
Last ReleaseJanuary 28, 2026
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as β€œPalo Alto Networks-certified” or otherwise.