Skip to main content

Twinwave

Download With Dependencies

TwinWave's threat analysis platform analyzes both URLs and files to detect credential phishing and malware threats. Our platform automatically navigates complex attack chains that attackers put in front of threats in order to evade analysis. In addition to detecting threats, the TwinWave platform generates actionable intelligence for threat hunting and other activities.

TwinWave's threat analysis platform analyzes both URLs and files to detect credential phishing and malware threats. Our platform automatically navigates complex attack chains that attackers put in front of threats in order to evade analysis. In addition to detecting threats, the TwinWave platform generates actionable intelligence for threat hunting and other activities.

What does this pack do?

The playbooks in this pack are used to integrate with the TwinWave threat analysis platform. Use TwinWave to:

  • investigate potentially malicious URLs
  • investigate potentially malicious files, such as PDFs, Word documents, executables, etc.
  • automatically triage high-volume incident streams, such as user-reported phish emails, or HTTP proxy URL exceptions
  • capture and analyze forensic artifacts associated with potential threats

To learn more about TwinWave, visit the TwinWave website

TwinWave's threat analysis platform analyzes both URLs and files to detect credential phishing and malware threats. Our platform automatically navigates complex attack chains that attackers put in front of threats in order to evade analysis. In addition to detecting threats, the TwinWave platform generates actionable intelligence for threat hunting and other activities.

What does this pack do?

The playbooks in this pack are used to integrate with the TwinWave threat analysis platform. Use TwinWave to:

  • investigate potentially malicious URLs
  • investigate potentially malicious files, such as PDFs, Word documents, executables, etc.
  • automatically triage high-volume incident streams, such as user-reported phish emails, or HTTP proxy URL exceptions
  • capture and analyze forensic artifacts associated with potential threats

To learn more about TwinWave, visit the TwinWave website

PUBLISHER

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByPartner
CreatedDecember 22, 2020
Last ReleaseJune 2, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.