<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pass-the-Ticket - PtT in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246750#M9058</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1394400413"&gt;@EMARTINS BERNARDES&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cortex XSIAM primarily addresses&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Pass-the-Ticket (PtT)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;attacks through its built-in&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Identity Analytics&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;engine rather than requiring a manual correlation rule from scratch. This approach is generally more effective as it leverages baselining and multi-host behavior that is difficult to capture in a static query.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;1. Ready-Made Analytics Detector&lt;/H4&gt;
&lt;P&gt;Cortex XSIAM includes a dedicated out-of-the-box (OOTB) detector for this technique:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Detector Name:&lt;/STRONG&gt; Possible TGT reuse from different hosts (pass the ticket)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Alert ID:&lt;/STRONG&gt; ID-4604&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Detection Logic:&lt;/STRONG&gt;&lt;BR /&gt;This detector triggers when the system observes two different hosts sending a Ticket Granting Service (TGS) request using the same Ticket Granting Ticket (TGT).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;MITRE ATT&amp;amp;CK Mapping:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Lateral Movement (TA0008)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Use Alternate Authentication Material: Pass the Ticket (T1550.003)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Internal logs may also show an alert titled &lt;STRONG&gt;“Pass-The-Ticket Attack Detected”&lt;/STRONG&gt;, mapped to &lt;STRONG&gt;MITRE T1550&lt;/STRONG&gt;, in environments where &lt;STRONG&gt;Identity Threat Detection and Response (ITDR)&lt;/STRONG&gt; is enabled.&lt;/P&gt;
&lt;H4&gt;2. Essential Configuration and Prerequisites&lt;/H4&gt;
&lt;P&gt;To ensure these ready-made detections function correctly, verify the following configurations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Enable Identity Analytics:&lt;/STRONG&gt;&lt;BR /&gt;Navigate to &lt;STRONG&gt;Settings → Configurations → Cortex Analytics&lt;/STRONG&gt; and confirm that &lt;STRONG&gt;Identity Analytics&lt;/STRONG&gt; is enabled under the &lt;EM&gt;Featured in Analytics&lt;/EM&gt; section.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud Identity Engine (CIE) Synchronization:&lt;/STRONG&gt;&lt;BR /&gt;A successful synchronization with CIE is required to provide the Active Directory context necessary for identity-based correlations.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Agent Deployment:&lt;/STRONG&gt;&lt;BR /&gt;The detector relies on telemetry collected by the &lt;STRONG&gt;Cortex XDR Agent&lt;/STRONG&gt; deployed on endpoints and domain controllers.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;3. Logic Ideas for Custom Correlation Rules&lt;/H4&gt;
&lt;P&gt;If you choose to create a custom rule, effective logic typically focuses on anomalies in Kerberos-related events (Event IDs &lt;STRONG&gt;4768&lt;/STRONG&gt;, &lt;STRONG&gt;4769&lt;/STRONG&gt;, &lt;STRONG&gt;4624&lt;/STRONG&gt;). Key patterns to consider include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Mismatched Source IPs:&lt;/STRONG&gt;&lt;BR /&gt;Detect scenarios where a Kerberos ticket is requested from one IP address but later used from another.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Suspicious Encryption Types:&lt;/STRONG&gt;&lt;BR /&gt;Monitor for Kerberos tickets using weak or deprecated encryption, such as &lt;STRONG&gt;RC4 (encryption type 0x17)&lt;/STRONG&gt;. XSIAM already tracks related anomalies through detections focused on weakly encrypted Kerberos responses, which may indicate credential manipulation or Skeleton Key activity.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Unusual Process Access:&lt;/STRONG&gt;&lt;BR /&gt;In Windows environments, Pass-the-Ticket attacks often involve tools accessing &lt;STRONG&gt;LSASS&lt;/STRONG&gt; process memory. Custom BIOCs can be used to detect suspicious memory access patterns or credential-dumping tools before the ticket is reused.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;4. Verifying Coverage&lt;/H4&gt;
&lt;P&gt;To confirm whether your environment is already protected:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Review the &lt;STRONG&gt;Cortex XSIAM Analytics Alert Reference&lt;/STRONG&gt; to see the latest centrally managed multi-event rules.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Check the &lt;STRONG&gt;MITRE ATT&amp;amp;CK Framework Coverage&lt;/STRONG&gt; dashboard in the console to identify techniques with active OOTB detection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If using &lt;STRONG&gt;XQL&lt;/STRONG&gt; for custom analytics, ensure queries are built against the &lt;STRONG&gt;xdr_data&lt;/STRONG&gt; or &lt;STRONG&gt;microsoft_windows_raw&lt;/STRONG&gt; datasets.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Jan 2026 22:01:59 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-01-27T22:01:59Z</dc:date>
    <item>
      <title>Pass-the-Ticket - PtT</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246747#M9057</link>
      <description>&lt;P&gt;Hi guys,&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;I’d like to know if anyone already has a detection rule configured in &lt;STRONG&gt;XSIAM correlation&lt;/STRONG&gt; for a &lt;STRONG&gt;Pass‑the‑Ticket attack&lt;/STRONG&gt;.&lt;BR /&gt;I’m building a rule from scratch, but it’s not as effective as I’d like.&lt;/P&gt;
&lt;P&gt;If anyone has a ready‑made rule or some solid ideas and can share them, it would greatly speed up the process.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 27 Jan 2026 19:04:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246747#M9057</guid>
      <dc:creator>EMARTINS BERNARDES</dc:creator>
      <dc:date>2026-01-27T19:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Pass-the-Ticket - PtT</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246750#M9058</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1394400413"&gt;@EMARTINS BERNARDES&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cortex XSIAM primarily addresses&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Pass-the-Ticket (PtT)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;attacks through its built-in&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Identity Analytics&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;engine rather than requiring a manual correlation rule from scratch. This approach is generally more effective as it leverages baselining and multi-host behavior that is difficult to capture in a static query.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;1. Ready-Made Analytics Detector&lt;/H4&gt;
&lt;P&gt;Cortex XSIAM includes a dedicated out-of-the-box (OOTB) detector for this technique:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Detector Name:&lt;/STRONG&gt; Possible TGT reuse from different hosts (pass the ticket)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Alert ID:&lt;/STRONG&gt; ID-4604&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Detection Logic:&lt;/STRONG&gt;&lt;BR /&gt;This detector triggers when the system observes two different hosts sending a Ticket Granting Service (TGS) request using the same Ticket Granting Ticket (TGT).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;MITRE ATT&amp;amp;CK Mapping:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Lateral Movement (TA0008)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Use Alternate Authentication Material: Pass the Ticket (T1550.003)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Internal logs may also show an alert titled &lt;STRONG&gt;“Pass-The-Ticket Attack Detected”&lt;/STRONG&gt;, mapped to &lt;STRONG&gt;MITRE T1550&lt;/STRONG&gt;, in environments where &lt;STRONG&gt;Identity Threat Detection and Response (ITDR)&lt;/STRONG&gt; is enabled.&lt;/P&gt;
&lt;H4&gt;2. Essential Configuration and Prerequisites&lt;/H4&gt;
&lt;P&gt;To ensure these ready-made detections function correctly, verify the following configurations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Enable Identity Analytics:&lt;/STRONG&gt;&lt;BR /&gt;Navigate to &lt;STRONG&gt;Settings → Configurations → Cortex Analytics&lt;/STRONG&gt; and confirm that &lt;STRONG&gt;Identity Analytics&lt;/STRONG&gt; is enabled under the &lt;EM&gt;Featured in Analytics&lt;/EM&gt; section.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud Identity Engine (CIE) Synchronization:&lt;/STRONG&gt;&lt;BR /&gt;A successful synchronization with CIE is required to provide the Active Directory context necessary for identity-based correlations.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Agent Deployment:&lt;/STRONG&gt;&lt;BR /&gt;The detector relies on telemetry collected by the &lt;STRONG&gt;Cortex XDR Agent&lt;/STRONG&gt; deployed on endpoints and domain controllers.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;3. Logic Ideas for Custom Correlation Rules&lt;/H4&gt;
&lt;P&gt;If you choose to create a custom rule, effective logic typically focuses on anomalies in Kerberos-related events (Event IDs &lt;STRONG&gt;4768&lt;/STRONG&gt;, &lt;STRONG&gt;4769&lt;/STRONG&gt;, &lt;STRONG&gt;4624&lt;/STRONG&gt;). Key patterns to consider include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Mismatched Source IPs:&lt;/STRONG&gt;&lt;BR /&gt;Detect scenarios where a Kerberos ticket is requested from one IP address but later used from another.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Suspicious Encryption Types:&lt;/STRONG&gt;&lt;BR /&gt;Monitor for Kerberos tickets using weak or deprecated encryption, such as &lt;STRONG&gt;RC4 (encryption type 0x17)&lt;/STRONG&gt;. XSIAM already tracks related anomalies through detections focused on weakly encrypted Kerberos responses, which may indicate credential manipulation or Skeleton Key activity.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Unusual Process Access:&lt;/STRONG&gt;&lt;BR /&gt;In Windows environments, Pass-the-Ticket attacks often involve tools accessing &lt;STRONG&gt;LSASS&lt;/STRONG&gt; process memory. Custom BIOCs can be used to detect suspicious memory access patterns or credential-dumping tools before the ticket is reused.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;4. Verifying Coverage&lt;/H4&gt;
&lt;P&gt;To confirm whether your environment is already protected:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Review the &lt;STRONG&gt;Cortex XSIAM Analytics Alert Reference&lt;/STRONG&gt; to see the latest centrally managed multi-event rules.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Check the &lt;STRONG&gt;MITRE ATT&amp;amp;CK Framework Coverage&lt;/STRONG&gt; dashboard in the console to identify techniques with active OOTB detection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If using &lt;STRONG&gt;XQL&lt;/STRONG&gt; for custom analytics, ensure queries are built against the &lt;STRONG&gt;xdr_data&lt;/STRONG&gt; or &lt;STRONG&gt;microsoft_windows_raw&lt;/STRONG&gt; datasets.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 22:01:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246750#M9058</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-01-27T22:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pass-the-Ticket - PtT</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246855#M9060</link>
      <description>&lt;P&gt;Can you describe your correlation rule? What methods are you using to validate your detection?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 14:06:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/pass-the-ticket-ptt/m-p/1246855#M9060</guid>
      <dc:creator>ChrisDavila</dc:creator>
      <dc:date>2026-01-28T14:06:03Z</dc:date>
    </item>
  </channel>
</rss>

