Tabletop
Tabletop
Analyze
Verify
In conjunction with a senior member of the SOC
● Double check previous data
● Rule out False Positive
Identify IOCs
● Validate hashes
○ VirusTotal
○ Hybrid Analysis
● Validate links
○ VirusTotal
○ Hybrid Analysis
○ URLScan
● ID subject, attachments, from addr
● ID other addresses, domains, IPs
○ VirusTotal
○ Hybrid Analysis
○ Talos Intelligence
● Search Threat Intel sources
○ VirusTotal
○ Hybrid Analysis
○ Talos Intelligence
● Disk forensics on recipient's endpoint
Scan Enterprise
● Update spam filter
● Update FW, IDS, etc. rules w/ IOCs
● Search all mail folders for IOCs
● Search endpoints for IOCs w/ EDR
Update Scope
● Update lists of
○ affected recipient addresses
○ affected endpoints
○ affected enclaves
○ affected business units
Update Scope
● Update lists of
○ affected recipient addresses
○ affected endpoints
○ affected enclaves
○ affected business units
Scope Validation
Have all the machines been identified? If you find further traces of phishing or new IOCs go
back through this step.
When you are done identifying all compromised:
● Hosts
● Mailboxes
And investigated all:
● URLs
● Domains
● IP
● Ports
● Files
● Hash
Go to the next phase ‘Contain/Eradicate’
4. Contain / Eradicate
Block
● Update Spam Filters
● Update FW, Proxy, etc. rules
● Blackhole DNS
● Submit to thrid parties
○ Google Safe Browsing
○ Web Filter Vendor
○ etc.
Malware Infection?
If there was malicious attachments that were opened we need to assume the endpoint(s)
was/were infected by a malware and proceed to the Malware Playbook
Delete Emails
● Delete From Users' Inboxes
○ Spam Tool
○ Email Admin Console
○ Cloud & On-Prem
● Delete Downloaded Attachments
○ EDR, SIEM, etc. to scan enterprise
Close Monitoring
● Monitor for
○ Related incoming messages
○ Internet connections to IOC
○ New files that matches hashes identified
5. Recover
Update Defenses
Determine which of the following rules needs to be removed and which needs to stay in the
following list:
● Spam Filters
● Firewall Rules
● EDR
○ ban hashes
○ ban domains
○ Containment
● Proxy Block
6. Post Incident
Incident Review
● What worked
● What didn't work