Hub
Security

Palo Alto Threat

Palo Alto PAN-OS Threat logs — IPS vulnerability exploits, antivirus detections, anti-spyware (DNS sinkhole and C2 callback), WildFire cloud verdicts, file type matching, and network scan detection with correlated severity, action, and threat category fields.

Quick Start

uv tool install eventum-generator
git clone https://github.com/eventum-generator/content-packs.git
cd content-packs
eventum generate \
  --path generators/network-paloalto-threat/generator.yml \
  --id panw-threat \
  --live-mode true

Event Types

Event IDDescriptionFrequencyCategory
spyware-dnsDNS-based spyware — malware domains, C2 callbacks, DNS tunneling~35%threat
vulnerabilityIPS vulnerability exploit signatures~20%threat
spyware-callbackC2 callback over HTTP/HTTPS~15%threat
virusAntivirus file-based detections (PE, ELF, scripts)~12%threat
file-scanFile type matching and network scan detection~10%threat
wildfireWildFire cloud verdicts — malware, grayware, phishing~8%threat

Realism Features

  • 70 threat signatures with realistic ID ranges per subtype (spyware, vulnerability, virus, wildfire, file, scan)
  • Correlated action distributions per subtype — DNS spyware uses sinkhole/drop; virus uses reset-both; vulnerability mostly alerts
  • Severity-to-syslog mapping with per-subtype severity distributions (critical through informational)
  • Direction correlation — DNS/C2/scan outbound, virus/wildfire/file inbound
  • Subtype-specific content versions (Antivirus-* for virus, AppThreat-* for others)
  • 55 malicious domains organized by threat category (C2, malware download, DNS tunnel)

Sample Output

{
    "@timestamp": "2026-03-06T14:22:31.000+00:00",
    "event": {
        "action": "spyware_detected",
        "category": ["intrusion_detection", "threat", "network"],
        "dataset": "panw.panos",
        "kind": "alert",
        "outcome": "failure",
        "severity": 3,
        "type": ["denied"]
    },
    "source": { "ip": "10.1.1.14", "user": { "name": "jsmith" } },
    "destination": { "ip": "10.100.15.1", "port": 53 },
    "network": { "application": "dns-base", "transport": "udp" },
    "panw": {
        "panos": {
            "action": "sinkhole",
            "severity": "medium",
            "sub_type": "spyware",
            "threat": { "name": "Suspicious DNS Query (Generic:c2-beacon.xyz)(327891564)" },
            "threat_category": "dns-malware"
        }
    },
    "observer": { "product": "PAN-OS", "vendor": "Palo Alto Networks" }
}

Parameters

ParameterDefaultDescription
hostnamePA-5260PAN-OS firewall hostname
domainCORPActive Directory domain
serial_number007200001056Firewall serial number
nat_ip198.51.100.1Source NAT IP
agent_ide4f8c1a2-...Elastic Agent ID
agent_version8.17.0Elastic Agent version

Related Generators