Vendors Palo Alto Networks WildFire WildFire Threat Detection
Palo Alto Networks Logo

WildFire Threat Detection

Advanced malware analysis and threat intelligence events

WildFire threat detection events including malware analysis results, threat classification, and file reputation

malware threat-intelligence file-analysis wildfire security
CSV Format 12 Fields Medium Frequency Generator

Overview

WildFire threat detection events generated when files are analyzed and classified as malicious by Palo Alto's cloud-based threat intelligence service

When Generated:

  • When files are submitted to WildFire for analysis
  • Upon completion of static and dynamic malware analysis
  • When threat verdicts are returned from WildFire cloud
  • During file reputation lookups for known threats

Security Relevance:

Critical

Compliance:

NIST Cybersecurity Framework MITRE ATT&CK ISO 27001 SOC 2

Frequency Notes:

Moderate frequency during business hours when file downloads and email attachments are common

Resources

Tools

Generation Configuration

Base Frequency: 25 events/hour
Time Patterns:
business_hours night_hours weekend
Business Hours Multiplier: 1.5x
Night Hours Multiplier: 0.8x
Weekend Multiplier: 0.6x

Field Definitions

Complete field reference for this event type with data types, descriptions, and example values.

Field Name Type Required Format Description Example Possible Values
threat_type
Source: threat_types | random
String Required Category of threat detected by WildFire analysis ransomware
virus — Traditional malware including trojans, worms, and viruses
spyware — Information stealing malware and keyloggers
vulnerability — Exploit attempts targeting known vulnerabilities
command-and-control — C2 communication and botnet activity
ransomware — File encryption and extortion malware
severity
Source: Calculated based on threat_type
String Required Threat severity level assigned by WildFire critical
informational — Low-impact or suspicious but not confirmed malicious
low — Minor threat with limited impact potential
medium — Moderate threat requiring attention
high — Significant threat requiring immediate action
critical — Severe threat with high impact potential
filename
Source: Dynamic generation based on threat type
String Required Name of analyzed file including extension invoice_a8b9c2d1.pdf
file_hash
Source: random_string(64, '0123456789abcdef')
String Required 64-character hexadecimal SHA-256 hash of analyzed file a1b2c3d4e5f67890abcdef1234567890abcdef1234567890abcdef1234567890
signature_id
Source: Generated with timestamp and random number
String Required Vendor:Date:ID Unique signature identifier from WildFire PaloAltoNetworks:20250526:12345
threat_description
Source: threat_descriptions[threat_type] | random
String Required Detailed description of threat behavior and characteristics WF-Ransom.PDF-JS BlackCat Ransomware variant detected
source_ip
Source: registry.get_random_device().ip_address
IP Address Required Internal IP address of host that triggered analysis 192.168.1.100
dest_ip
Source: random_public_ip()
IP Address Required External IP address contacted by malware 185.220.101.42
dest_country
Source: countries | random
String Required Country associated with destination IP Russia
session_id
Source: random_int(10000, 999999)
Integer Required Unique session identifier for the connection 542318
user
Source: registry.get_random_user().username
String Required Username associated with the threat event jdoe
timestamp
Source: current_timestamp() | format_timestamp('%Y/%m/%d %H:%M:%S')
DateTime Required YYYY/MM/DD HH:MM:SS Event timestamp in MM/DD/YYYY HH:MM:SS format 2025/05/26 14:30:15

Details

12
Fields
Medium
Frequency
5
Tags
wildfire_thr...
Event Type
Tags:
malware threat-intelligence file-analysis wildfire security

Feedback

No ratings yet