Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/TonyPhipps/SIEM
SIEM Tactics, Techiques, and Procedures
https://github.com/TonyPhipps/SIEM
analysis baseline blue forensics hunt incident log monitor purple recon red response scan security siem soc team threat threat-hunting triage
Last synced: about 1 month ago
JSON representation
SIEM Tactics, Techiques, and Procedures
- Host: GitHub
- URL: https://github.com/TonyPhipps/SIEM
- Owner: TonyPhipps
- License: gpl-3.0
- Created: 2018-08-02T16:40:34.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2024-10-18T16:30:10.000Z (about 2 months ago)
- Last Synced: 2024-10-18T17:03:24.102Z (about 2 months ago)
- Topics: analysis, baseline, blue, forensics, hunt, incident, log, monitor, purple, recon, red, response, scan, security, siem, soc, team, threat, threat-hunting, triage
- Language: PowerShell
- Homepage:
- Size: 1.32 MB
- Stars: 580
- Watchers: 32
- Forks: 101
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-github-repos - TonyPhipps/SIEM - SIEM Tactics, Techiques, and Procedures (PowerShell)
- awesome-event-ids - SIEM Tactics, Techniques, and Procedures - Comprehensive SIEM resources be TonyPhipps. (Resources / Event ID configuration and monitoring suggestions)
- awesome-rainmana - TonyPhipps/SIEM - SIEM Tactics, Techiques, and Procedures (PowerShell)
README
These resources are intended to guide a SIEM team to...
* ... develop a workflow for content creation (and retirement) in the SIEM and other security tools.
* ... illustrate detection coverage provided and highlight coverage gaps as goals to fill.
* ... eliminate or add additional layers of coverage based on organizational needs.
* Ensure proper logs are generated and recorded for sufficient detection, investigation, and compliance.# Preparation, Prerequisites, etc.
Without covering the basics, there isn't much point in having a SIEM. Harden your environment and configure appropriate auditing on all endpoints.
- [Preparation](/Preparation.md)
- [Incident Response Policy Sample](Incident-Response-Policy.md)
- [RSS Feeds](/rss.md)
- [Email Subscriptions](/Subscriptions.md)
- [Logging](/Logging.md)
- [Notable Event IDs](/Notable-Event-IDs.md)
- [IR Tool & Resoures](/response-tools-resources.md)
- [Incident Tracking](/incident-tracking.md)
- [Metrics](/Metrics.md)
- [After Action Review](/After-Action-Review.md)
- [Attacker Tools](/attack-tools-resources.md)## Hardening
- [Microsoft Windows](hardening/microsoft-windows.md)
- [Microsoft Active Directory](hardening/microsoft-active-directory.md)
- [Network](hardening/network.md)# [Detection Tactics](/Detection-Tactics.md)
To detect an attacker, one must be equipped with the necessary logs to reveal their activities. Here we use a matrix to map detection tactics to attacker tactics ([Mitre ATT&CK](https://attack.mitre.org/)).
# [Detection Methods](/Detection-Methods.md)
Once necessary logs are collected (detection tactics), use various methods to reveal anomalous, suspicious, and malicious activity.
# Detection Use Cases
Use Cases provide a means to document solutions for many reasons including tracking work, uniform response, content recreation, metrics & reporting, making informed decisions, avoiding work duplication, and more.
- [Use Case Structure](/Use-Case-Structure.md)
- [Use Case Review](/Use-Case-Review.md)# Data Enrichment
These efforts can provide significant benefits to some ingested logs. Typically enrichment will result in either adding a new field to events or a lookup table for use in filtering or filling in a field.
- GeoIP/ASN Lookup
- Levenshtein Distance
- Shannon Entropy Scores
- String Lengths
- Top 1 Million Domains
- WHOIS Caching
- DNS Lookup
- Reverse-DNS Lookup
- Certificate Parsing
- [O365 Principal App IDs](/Lookups/o365-principalappid.csv)
- [Windows Logon Type Lookups](/Lookups/windows-logon-type.csv)
- [Windows Status Code Lookups](/Lookups/windows-status-code.csv)# [Lab](/Lab/WindowsVictim.md)
Set up a lab with a Windows system, a SIEM, and an attacking system to aid in detection research and development.# TODO
- [ ] Add Use Case Examples
- [ ] Add Threat Hunts Library
- [ ] Add an object oriented, relational database approach to recording and associating all elements to one another - cases, adversaries, techniques, mitigations, detections, hunts, log sources, etc.