STEP-BY-STEP
TO INVESTIGATE
AN ALERT FROM
SIEM WITH
EXPLANATION &
SIMULATION
BY IZZMIER IZZUDDIN
CONTENTS
GENERAL STEP-BY-STEP GUIDE TO INVESTIGATE AN ALERT FROM SIEM .................................. 3
EXAMPLES WITH EXPLAINATION ..................................................................................................... 5
Example Alert 1: Malware Detected On Endpoint ...................................................................... 5
Example Alert 2: Suspicious Network Activity ............................................................................ 8
Example Alert 3: Brute-Force Attack Detected On Web Server .............................................. 11
Example Alert 4: Unauthorised Access To Critical File ............................................................ 14
Example Alert 5: Data Exfiltration Detected ............................................................................. 17
Example Alert 6: Brute Force Attack Detected ......................................................................... 20
Example Alert 7: Phishing Email Detected ................................................................................ 23
Example Alert 8: Suspicious File Download Detected ............................................................. 26
Example Alert 9: Unusual Network Activity Detected .............................................................. 29
Example Alert 10: Unauthorised Access Attempt Detected ................................................... 32
SIMULATION .................................................................................................................................... 35
Simulation Alert: Suspicious Network Activity Detected......................................................... 35
GENERAL STEP-BY-STEP GUIDE TO INVESTIGATE AN ALERT FROM SIEM
1. Initial Alert Triage
1. Review Alert Details
o Examine the alert for key details: source, destination, type, time, etc.
2. Prioritise the Alert
o Assess the criticality based on the nature of the alert and potential
impact.
2. Data Collection
1. Gather Relevant Logs
o Collect logs from various sources (e.g., firewalls, servers, endpoints)
to analyse the alert.
2. Analyse Context
o Use OSINT tools to gather additional information about involved IPs,
files, etc.
3. Initial Analysis
1. Check Indicators of Compromise (IoCs)
o Analyse IoCs such as IP addresses, file hashes, and URLs to identify
known threats.
2. Assess Impact
o Evaluate the potential impact on the system and organisation.
4. Deep Dive Analysis
1. Use OSINT Tools
o Utilise OSINT tools for further investigation of IoCs and threat
intelligence.
2. Analyse Patterns and Behaviour
o Examine logs and network traffic to understand the behaviour and
pattern of the alert.
5. Containment and Mitigation
1. Quarantine or Block Malicious Entities
o Isolate or block malicious files, IPs, and other entities.
2. Enhance Security Measures
o Implement additional security measures to prevent recurrence.
3. Identify Related Activities
o Check for other systems or activities that might be related to the alert.
6. Eradication
1. Remove Malicious Entities
o Ensure all malicious files, connections, and access points are
removed.
2. Verify System Integrity
o Confirm that systems are secure and functioning correctly.
7. Recovery
1. Restore Operations
o Reconnect and monitor the system for any further issues.
2. Communication
o Inform stakeholders about the incident and remediation steps taken.
EXAMPLES WITH EXPLAINATION
Example Alert 1: Malware Detected On Endpoint
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand which endpoint is affected,
the type of malware detected, and the time of detection.
o Example: Endpoint: PC-01, Malware: Trojan.Win32.Generic, Time: 2024-
07-28 10:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the potential impact of the
malware.
o Example: High-priority if the malware is capable of stealing sensitive
information.
2. Data Collection
1. Gather Endpoint Logs
o Explanation: Collect relevant logs from the affected endpoint to analyse
the malware detection.
o Example Logs:
Antivirus Logs:
Jul 28 10:00:00 AV: Malware detected on PC-01,
Trojan.Win32.Generic
2. Analyse Malware Sample
o Explanation: Use OSINT tools to gather information about the detected
malware.
o Example: Checking if Trojan.Win32.Generic is known for malicious
activities using OSINT tools like VirusTotal, Hybrid Analysis, and
MalwareBazaar.
3. Initial Analysis
1. Check User Actions
o Explanation: Determine if the user performed any actions that led to the
malware infection.
o Example: Checking if the user on PC-01 downloaded a suspicious file or
visited a malicious website.
2. Assess Malware Impact
o Explanation: Evaluate the potential impact of the malware on the
affected endpoint and the organisation.
o Example: Identifying if the malware has exfiltrated data or compromised
other systems.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the detected malware.
o Example:
VirusTotal: Check if the detected malware sample is flagged as
malicious.
Hybrid Analysis: Analyse the behaviour of the malware sample in
a sandbox environment.
MalwareBazaar: Investigate if the malware sample is known and
categorised.
2. Endpoint Behaviour Analysis
o Explanation: Analyse the behaviour of the affected endpoint to identify
any anomalies.
o Example: Reviewing system changes, network connections, and
processes initiated by the malware on PC-01.
5. Containment and Mitigation
1. Isolate Endpoint
o Explanation: If the malware is confirmed malicious, isolate the endpoint
to prevent further spread.
o Example: Disconnecting PC-01 from the network.
2. Remove Malware
o Explanation: Ensure the malware is removed from the affected endpoint.
o Example: Running a full system scan and malware removal tool on PC-
01.
3. Identify Other Infected Systems
o Explanation: Check if other systems are infected by the same malware.
o Example: Searching antivirus logs for other instances of
Trojan.Win32.Generic.
6. Eradication
1. Remove Malicious Files
o Explanation: Ensure any malicious files and registry changes made by
the malware are removed.
o Example: Deleting malicious files and reverting registry changes on PC-
01.
2. Verify Integrity
o Explanation: Confirm that the endpoint is secure and functioning
correctly before reconnecting it to the network.
o Example: Reviewing system logs and configurations on PC-01 to ensure
there are no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured endpoint to the
network and monitor for any further issues.
o Example: Reconnecting PC-01 and monitoring for any signs of malware
activity.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Antivirus Logs:
Jul 28 10:00:00 AV: Malware detected on PC-01, Trojan.Win32.Generic
Jul 28 10:00:05 AV: Quarantined file C:\Users\User\Downloads\suspicious_file.exe
System Event Logs:
Jul 28 10:00:00 PC-01: Suspicious file downloaded from http://malicious.example.com
Jul 28 10:00:05 PC-01: Executed file C:\Users\User\Downloads\suspicious_file.exe
Example Alert 2: Suspicious Network Activity
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the source and destination
IP addresses, the type of suspicious activity, and the time it was
detected.
o Example: Source IP: 192.168.1.10, Destination IP: 203.0.113.50, Activity:
Unusual data transfer, Time: 2024-07-28 12:30:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the potential impact of the
suspicious activity.
o Example: High-priority if the data transfer involves sensitive information.
2. Data Collection
1. Gather Network Logs
o Explanation: Collect relevant network logs to analyse the suspicious
activity.
o Example Logs:
Firewall Logs:
Jul 28 12:30:00 Firewall: Large data transfer detected from
192.168.1.10 to 203.0.113.50
2. Analyse Network Traffic
o Explanation: Use OSINT tools to gather information about the source and
destination IP addresses.
o Example: Checking if 203.0.113.50 is known for malicious activities using
OSINT tools like Shodan, IPinfo, and AbuseIPDB.
3. Initial Analysis
1. Check User Actions
o Explanation: Determine if the user on the source IP performed any
actions that led to the suspicious activity.
o Example: Checking if the user on 192.168.1.10 initiated the data transfer
or if it was automated.
2. Assess Activity Impact
o Explanation: Evaluate the potential impact of the suspicious activity on
the network and the organisation.
o Example: Identifying if any sensitive data was transferred to the
destination IP.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the source and destination IP addresses.
o Example:
Shodan: Investigate if the IP 203.0.113.50 has open ports or is
associated with known malicious activity.
IPinfo: Check the geolocation and ownership details of the IP
address.
AbuseIPDB: Verify if the IP address is reported for abusive
activities.
2. Network Traffic Analysis
o Explanation: Analyse the network traffic involved in the suspicious
activity to identify any anomalies.
o Example: Reviewing the payload of the data transfer to detect any signs
of malicious content.
5. Containment and Mitigation
1. Block Malicious IP
o Explanation: If the destination IP is confirmed malicious, block it to
prevent further suspicious activity.
o Example: Adding 203.0.113.50 to the firewall block list.
2. Secure Source IP
o Explanation: Ensure the source IP is secured to prevent further
suspicious activity.
o Example: Checking the security configuration and applying necessary
patches on 192.168.1.10.
3. Identify Other Suspicious Activity
o Explanation: Check if other systems exhibit similar suspicious network
activity.
o Example: Searching network logs for other instances of unusual data
transfers.
6. Eradication
1. Remove Malicious Access
o Explanation: Ensure any unauthorised access to the network is removed
and the network is secured.
o Example: Disabling any suspicious user accounts and changing
credentials for all affected systems.
2. Verify Integrity
o Explanation: Confirm that the network is secure and functioning
correctly before reconnecting it to the network.
o Example: Reviewing network logs and configurations to ensure there are
no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured network to the
organisation and monitor for any further issues.
o Example: Reconnecting the network and monitoring for any signs of
suspicious activity.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Firewall Logs:
Jul 28 12:30:00 Firewall: Large data transfer detected from 192.168.1.10 to
203.0.113.50
Jul 28 12:30:05 Firewall: Data transfer allowed
Network Traffic Logs:
Jul 28 12:30:00 Network: Connection attempt from 192.168.1.10 to 203.0.113.50
Jul 28 12:30:05 Network: Data transfer of 500MB from 192.168.1.10 to 203.0.113.50
Example Alert 3: Brute-Force Attack Detected On Web Server
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the source IP, target
server, and the number of failed login attempts.
o Example: Source IP: 198.51.100.25, Target Server: WebServer-01, Failed
Attempts: 50, Time: 2024-07-28 14:45:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the potential impact of the
brute-force attack.
o Example: High-priority if the target server hosts sensitive applications or
data.
2. Data Collection
1. Gather Web Server Logs
o Explanation: Collect relevant logs from the affected web server to
analyse the brute-force attack.
o Example Logs:
Authentication Logs:
Jul 28 14:45:00 WebServer-01: Failed login attempt for user admin
from IP 198.51.100.25
2. Analyse Attack Pattern
o Explanation: Use OSINT tools to gather information about the source IP
and the attack pattern.
o Example: Checking if 198.51.100.25 is known for brute-force attacks
using OSINT tools like AbuseIPDB, AlienVault OTX, and Censys.
3. Initial Analysis
1. Check Attack Duration
o Explanation: Determine the duration and intensity of the brute-force
attack.
o Example: Identifying if the attack is ongoing or if it was a one-time event.
2. Assess Impact
o Explanation: Evaluate the potential impact of the brute-force attack on
the target server and the organisation.
o Example: Identifying if any user accounts were compromised during the
attack.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the source IP and the nature of the brute-force attack.
o Example:
AbuseIPDB: Check if the IP 198.51.100.25 is reported for brute-
force attacks.
AlienVault OTX: Investigate if the IP address is part of a known
attack campaign.
Censys: Examine the services and vulnerabilities associated with
the source IP.
2. Attack Pattern Analysis
o Explanation: Analyse the pattern of the brute-force attack to identify any
anomalies.
o Example: Reviewing the frequency and timing of the failed login attempts
to detect any specific patterns.
5. Containment and Mitigation
1. Block Malicious IP
o Explanation: If the source IP is confirmed malicious, block it to prevent
further brute-force attempts.
o Example: Adding 198.51.100.25 to the firewall block list.
2. Enhance Authentication Security
o Explanation: Ensure the target server has strong authentication
mechanisms to prevent brute-force attacks.
o Example: Implementing multi-factor authentication (MFA) and account
lockout policies on WebServer-01.
3. Identify Other Targets
o Explanation: Check if other servers are targeted by the same brute-force
attack.
o Example: Searching authentication logs for other instances of failed login
attempts from IP 198.51.100.25.
6. Eradication
1. Remove Malicious Access
o Explanation: Ensure any unauthorised access resulting from the brute-
force attack is removed and the server is secured.
o Example: Disabling any suspicious user accounts and changing
credentials for all affected systems.
2. Verify Integrity
o Explanation: Confirm that the server is secure and functioning correctly
before reconnecting it to the network.
o Example: Reviewing server logs and configurations on WebServer-01 to
ensure there are no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured server to the network
and monitor for any further issues.
o Example: Reconnecting WebServer-01 and monitoring for any signs of
brute-force attacks.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Authentication Logs:
Jul 28 14:45:00 WebServer-01: Failed login attempt for user admin from IP
198.51.100.25
Jul 28 14:45:05 WebServer-01: Failed login attempt for user admin from IP
198.51.100.25
Web Server Logs:
Jul 28 14:45:00 WebServer-01: Connection attempt from IP 198.51.100.25
Jul 28 14:45:05 WebServer-01: Multiple failed login attempts for user admin
Example Alert 4: Unauthorised Access To Critical File
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand which file was accessed,
the user who accessed it, and the time of access.
o Example: File: /etc/passwd, User: izzmier, Time: 2024-07-28 16:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the sensitivity of the
accessed file and the potential impact.
o Example: High-priority if the file contains sensitive information like user
credentials.
2. Data Collection
1. Gather File Access Logs
o Explanation: Collect relevant logs to analyse the unauthorised access.
o Example Logs:
System Logs:
Jul 28 16:00:00 Server-01: Unauthorised access attempt by user
izzmier to file /etc/passwd
2. Analyse User Actions
o Explanation: Use OSINT tools to gather information about the user and
their previous activities.
o Example: Checking if izzmier has any history of suspicious activity using
OSINT tools like LinkedIn, social media profiles, and internal user
behaviour analysis tools.
3. Initial Analysis
1. Check User Permissions
o Explanation: Determine if the user should have access to the critical file.
o Example: Verifying izzmier’s role and permissions to access
/etc/passwd.
2. Assess Access Impact
o Explanation: Evaluate the potential impact of the unauthorised access
on the system and the organisation.
o Example: Identifying if any sensitive information was accessed or
modified.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the user and the accessed file.
o Example:
LinkedIn: Verify izzmier’s job role and responsibilities.
Social Media: Check for any suspicious behaviour or posts
indicating potential insider threats.
Internal User Behaviour Analysis: Review izzmier’s recent
activities and access patterns.
2. File Access Analysis
o Explanation: Analyse the accessed file to identify any unauthorised
changes or data exfiltration.
o Example: Reviewing file integrity and comparing it with previous versions
to detect any modifications.
5. Containment and Mitigation
1. Revoke Unauthorised Access
o Explanation: If the access is unauthorised, revoke the user's permissions
to the critical file.
o Example: Removing izzmier’s access to /etc/passwd.
2. Enhance File Security
o Explanation: Ensure the critical file is secured with appropriate access
controls and monitoring.
o Example: Implementing file integrity monitoring and access controls for
/etc/passwd.
3. Identify Other Unauthorised Access
o Explanation: Check if other users have accessed the critical file without
authorisation.
o Example: Searching system logs for other unauthorised access attempts
to /etc/passwd.
6. Eradication
1. Remove Unauthorised Changes
o Explanation: Ensure any unauthorised changes to the critical file are
removed and the file is restored to its original state.
o Example: Restoring /etc/passwd from a secure backup.
2. Verify File Integrity
o Explanation: Confirm that the critical file is secure and functioning
correctly before allowing access.
o Example: Reviewing file integrity and access controls to ensure there are
no remaining issues.
7. Recovery
1. Restore Operations
Explanation: Ensure the system is secure and monitor for any further
o
unauthorised access attempts.
o Example: Reconnecting the system to the network and monitoring
access to /etc/passwd.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
System Logs:
Jul 28 16:00:00 Server-01: Unauthorised access attempt by user izzmier to file
/etc/passwd
Jul 28 16:00:05 Server-01: Access denied to file /etc/passwd for user izzmier
Access Control Logs:
Jul 28 16:00:00 Server-01: User izzmier attempted to access restricted file /etc/passwd
Jul 28 16:00:05 Server-01: User izzmier denied access to /etc/passwd
Example Alert 5: Data Exfiltration Detected
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand which data was exfiltrated,
the source and destination IP addresses, and the time of detection.
o Example: Data: Customer Database, Source IP: 192.168.1.15,
Destination IP: 203.0.113.100, Time: 2024-07-28 18:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the sensitivity of the
exfiltrated data and the potential impact.
o Example: High-priority if the data includes sensitive customer
information.
2. Data Collection
1. Gather Network Logs
o Explanation: Collect relevant network logs to analyse the data
exfiltration.
o Example Logs:
Firewall Logs:
Jul 28 18:00:00 Firewall: Large data transfer detected from
192.168.1.15 to 203.0.113.100
2. Analyse Exfiltration Path
o Explanation: Use OSINT tools to gather information about the destination
IP and the nature of the exfiltrated data.
o Example: Checking if 203.0.113.100 is known for receiving exfiltrated
data using OSINT tools like Shodan, IPinfo, and AbuseIPDB.
3. Initial Analysis
1. Check User Actions
o Explanation: Determine if the user on the source IP performed any
actions that led to the data exfiltration.
o Example: Checking if the user on 192.168.1.15 intentionally transferred
the data or if it was automated.
2. Assess Exfiltration Impact
o Explanation: Evaluate the potential impact of the data exfiltration on the
organisation.
o Example: Identifying if any sensitive customer information was
transferred to the destination IP.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the destination IP and the nature of the exfiltrated data.
o Example:
Shodan: Investigate if the IP 203.0.113.100 has open ports or is
associated with known malicious activity.
IPinfo: Check the geolocation and ownership details of the IP
address.
AbuseIPDB: Verify if the IP address is reported for abusive
activities.
2. Network Traffic Analysis
o Explanation: Analyse the network traffic involved in the data exfiltration
to identify any anomalies.
o Example: Reviewing the payload of the data transfer to detect any signs
of malicious content.
5. Containment and Mitigation
1. Block Malicious IP
o Explanation: If the destination IP is confirmed malicious, block it to
prevent further data exfiltration.
o Example: Adding 203.0.113.100 to the firewall block list.
2. Secure Source IP
o Explanation: Ensure the source IP is secured to prevent further data
exfiltration.
o Example: Checking the security configuration and applying necessary
patches on 192.168.1.15.
3. Identify Other Data Exfiltration Attempts
o Explanation: Check if other systems are involved in data exfiltration.
o Example: Searching network logs for other instances of unusual data
transfers.
6. Eradication
1. Remove Malicious Access
o Explanation: Ensure any unauthorised access to the network is removed
and the network is secured.
o Example: Disabling any suspicious user accounts and changing
credentials for all affected systems.
2. Verify Data Integrity
o Explanation: Confirm that the exfiltrated data is secure and functioning
correctly before allowing access.
o Example: Reviewing network logs and configurations to ensure there are
no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured network to the
organisation and monitor for any further issues.
o Example: Reconnecting the network and monitoring for any signs of data
exfiltration.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Firewall Logs:
Jul 28 18:00:00 Firewall: Large data transfer detected from 192.168.1.15 to
203.0.113.100
Jul 28 18:00:05 Firewall: Data transfer allowed
Network Traffic Logs:
Jul 28 18:00:00 Network: Connection attempt from 192.168.1.15 to 203.0.113.100
Jul 28 18:00:05 Network: Data transfer of 1GB from 192.168.1.15 to 203.0.113.100
Example Alert 6: Brute Force Attack Detected
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the source IP, target
system, and the number of failed login attempts.
o Example: Source IP: 198.51.100.25, Target System: DB-Server, Failed
Attempts: 100, Time: 2024-07-28 20:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the potential impact of the
brute-force attack.
o Example: High-priority if the target system hosts critical applications or
data.
2. Data Collection
1. Gather System Logs
o Explanation: Collect relevant logs to analyse the brute-force attack.
o Example Logs:
Authentication Logs:
Jul 28 20:00:00 DB-Server: Failed login attempt for user admin
from IP 198.51.100.25
2. Analyse Attack Pattern
o Explanation: Use OSINT tools to gather information about the source IP
and the attack pattern.
o Example: Checking if 198.51.100.25 is known for brute-force attacks
using OSINT tools like AbuseIPDB, AlienVault OTX, and Censys.
3. Initial Analysis
1. Check Attack Duration
o Explanation: Determine the duration and intensity of the brute-force
attack.
o Example: Identifying if the attack is ongoing or if it was a one-time event.
2. Assess Impact
o Explanation: Evaluate the potential impact of the brute-force attack on
the target system and the organisation.
o Example: Identifying if any user accounts were compromised during the
attack.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the source IP and the nature of the brute-force attack.
o Example:
AbuseIPDB: Check if the IP 198.51.100.25 is reported for brute-
force attacks.
AlienVault OTX: Investigate if the IP address is part of a known
attack campaign.
Censys: Examine the services and vulnerabilities associated with
the source IP.
2. Attack Pattern Analysis
o Explanation: Analyse the pattern of the brute-force attack to identify any
anomalies.
o Example: Reviewing the frequency and timing of the failed login attempts
to detect any specific patterns.
5. Containment and Mitigation
1. Block Malicious IP
o Explanation: If the source IP is confirmed malicious, block it to prevent
further brute-force attempts.
o Example: Adding 198.51.100.25 to the firewall block list.
2. Enhance Authentication Security
o Explanation: Ensure the target system has strong authentication
mechanisms to prevent brute-force attacks.
o Example: Implementing multi-factor authentication (MFA) and account
lockout policies on DB-Server.
3. Identify Other Targets
o Explanation: Check if other systems are targeted by the same brute-
force attack.
o Example: Searching authentication logs for other instances of failed login
attempts from IP 198.51.100.25.
6. Eradication
1. Remove Malicious Access
o Explanation: Ensure any unauthorised access resulting from the brute-
force attack is removed and the system is secured.
o Example: Disabling any suspicious user accounts and changing
credentials for all affected systems.
2. Verify Integrity
o Explanation: Confirm that the system is secure and functioning correctly
before reconnecting it to the network.
o Example: Reviewing system logs and configurations on DB-Server to
ensure there are no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured system to the network
and monitor for any further issues.
o Example: Reconnecting DB-Server and monitoring for any signs of brute-
force attacks.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Authentication Logs:
Jul 28 20:00:00 DB-Server: Failed login attempt for user admin from IP 198.51.100.25
Jul 28 20:00:05 DB-Server: Failed login attempt for user admin from IP 198.51.100.25
System Logs
Jul 28 20:00:00 DB-Server: Connection attempt from IP 198.51.100.25
Jul 28 20:00:05 DB-Server: Multiple failed login attempts for user admin
Example Alert 7: Phishing Email Detected
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the source email,
recipient, and the time of detection.
o Example: Source Email:
[email protected], Recipient:
[email protected], Time: 2024-07-28 22:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the potential impact of the
phishing email.
o Example: High-priority if the email targets high-level executives or
contains links to malicious sites.
2. Data Collection
1. Gather Email Logs
o Explanation: Collect relevant email logs to analyse the phishing email.
o Example Logs:
Email Server Logs:
Jul 28 22:00:00 EmailServer: Received email from
[email protected] to
[email protected] 2. Analyse Email Content
o Explanation: Use OSINT tools to gather information about the phishing
email and the sender.
o Example: Checking if
[email protected] is known for phishing
attacks using OSINT tools like PhishTank, VirusTotal, and DomainTools.
3. Initial Analysis
1. Check Email Headers
o Explanation: Analyse the email headers to verify the authenticity of the
sender and detect any spoofing attempts.
o Example: Reviewing the email headers to identify any anomalies in the
sender’s domain.
2. Assess Impact
o Explanation: Evaluate the potential impact of the phishing email on the
recipient and the organisation.
o Example: Identifying if the email contains malicious links or attachments
that could compromise the recipient’s account.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the phishing email and the sender.
o Example:
PhishTank: Check if the email domain or links are reported for
phishing.
VirusTotal: Analyse email attachments for any malicious content.
DomainTools: Investigate the domain associated with the
sender’s email address.
2. Email Content Analysis
o Explanation: Analyse the content of the phishing email to identify any
social engineering tactics or malicious intent.
o Example: Reviewing the email body for any suspicious links,
attachments, or requests for sensitive information.
5. Containment and Mitigation
1. Block Malicious Sender
o Explanation: If the sender is confirmed malicious, block the email
address to prevent further phishing attempts.
o Example: Adding
[email protected] to the email server block list.
2. Enhance Email Security
o Explanation: Ensure the email server has strong security mechanisms to
detect and block phishing emails.
o Example: Implementing email filtering, anti-phishing software, and
employee training on recognising phishing emails.
3. Identify Other Phishing Emails
o Explanation: Check if other employees received similar phishing emails.
o Example: Searching email logs for other instances of emails from
[email protected].
6. Eradication
1. Remove Malicious Emails
o Explanation: Ensure any malicious emails are removed from the email
server and the recipients’ inboxes.
o Example: Deleting any phishing emails from
[email protected] in
the email server and recipient’s inboxes.
2. Verify Email Server Security
o Explanation: Confirm that the email server is secure and functioning
correctly before allowing normal email traffic.
o Example: Reviewing email server logs and configurations to ensure there
are no remaining issues.
7. Recovery
1. Restore Operations
oExplanation: Reconnect the cleaned and secured email server to the
network and monitor for any further issues.
o Example: Reconnecting the email server and monitoring for any signs of
phishing emails.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Email Server Logs:
Jul 28 22:00:00 EmailServer: Received email from
[email protected] to
[email protected]Jul 28 22:00:05 EmailServer: Email marked as phishing
Email Headers:
by EmailServer.example.com
with SMTP id 12345
for <
[email protected]>;
Mon, 28 Jul 2024 22:00:00 +0000
Subject: Urgent: Account Verification Required
From: "Support Team" <
[email protected]>
To:
[email protected]Example Alert 8: Suspicious File Download Detected
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the source, file details, and
the time of detection.
o Example: Source IP: 192.168.1.50, File: malicious.exe, Time: 2024-07-28
10:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the nature of the file and its
potential impact.
o Example: High-priority if the file is known to be associated with malware
or other malicious activities.
2. Data Collection
1. Gather Download Logs
o Explanation: Collect relevant logs to analyse the suspicious file
download.
o Example Logs:
Web Server Logs:
Jul 28 10:00:00 WebServer: Download of malicious.exe from
192.168.1.50
2. Analyse File Properties
o Explanation: Use OSINT tools to gather information about the suspicious
file.
o Example: Checking the file hash against VirusTotal and other malware
databases.
3. Initial Analysis
1. Check File Hash
o Explanation: Analyse the file hash to identify if it is known malware.
o Example: Using VirusTotal to check the hash of malicious.exe.
2. Assess Impact
o Explanation: Evaluate the potential impact of the downloaded file on the
system and the organisation.
o Example: Identifying if the file has executed and caused any damage.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the file and its behaviour.
o Example:
VirusTotal: Check if the file hash is reported as malicious.
Hybrid Analysis: Analyse the file's behaviour in a sandbox
environment.
MalwareBazaar: Investigate if the file is part of a known malware
campaign.
2. File Behaviour Analysis
o Explanation: Analyse the behaviour of the suspicious file to detect any
malicious activity.
o Example: Reviewing sandbox analysis results to understand what the file
does when executed.
5. Containment and Mitigation
1. Quarantine the File
o Explanation: If the file is confirmed malicious, quarantine it to prevent
execution.
o Example: Moving malicious.exe to a secure quarantine area.
2. Enhance Endpoint Security
o Explanation: Ensure the endpoint has strong security mechanisms to
detect and block malicious files.
o Example: Implementing antivirus and anti-malware solutions on
192.168.1.50.
3. Identify Other Downloads
o Explanation: Check if other systems downloaded the same or similar
suspicious files.
o Example: Searching web server logs for other instances of malicious.exe
downloads.
6. Eradication
1. Remove Malicious Files
o Explanation: Ensure any malicious files are removed from the endpoint
and the network.
o Example: Deleting malicious.exe from 192.168.1.50 and any other
affected systems.
2. Verify System Integrity
o Explanation: Confirm that the system is secure and functioning correctly
before allowing normal operations.
o Example: Reviewing system logs and configurations on 192.168.1.50 to
ensure there are no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured system to the network
and monitor for any further issues.
Example: Reconnecting 192.168.1.50 and monitoring for any signs of
o
suspicious file downloads.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Web Server Logs:
Jul 28 10:00:00 WebServer: Download of malicious.exe from 192.168.1.50
Jul 28 10:00:05 WebServer: File download completed
Endpoint Logs:
Jul 28 10:00:00 Endpoint: File download initiated for malicious.exe
Jul 28 10:00:05 Endpoint: File download completed for malicious.exe
Example Alert 9: Unusual Network Activity Detected
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the nature of the unusual
activity, source and destination IPs, and the time of detection.
o Example: Source IP: 192.168.1.100, Destination IP: 203.0.113.5, Activity:
High volume of traffic, Time: 2024-07-28 12:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the potential impact of the
unusual activity.
o Example: High-priority if the activity suggests a potential data exfiltration
or DDoS attack.
2. Data Collection
1. Gather Network Logs
o Explanation: Collect relevant logs to analyse the unusual network
activity.
o Example Logs:
Firewall Logs:
Jul 28 12:00:00 Firewall: High volume of traffic from 192.168.1.100
to 203.0.113.5
2. Analyse Traffic Patterns
o Explanation: Use OSINT tools to gather information about the network
activity and the involved IPs.
o Example: Checking if 203.0.113.5 is associated with any known
malicious activities using OSINT tools like Shodan, Censys, and
GreyNoise.
3. Initial Analysis
1. Check Traffic Volume
o Explanation: Analyse the volume and duration of the network activity to
identify if it is truly unusual.
o Example: Reviewing network logs to determine if the traffic volume is
abnormal compared to baseline activity.
2. Assess Impact
o Explanation: Evaluate the potential impact of the unusual network
activity on the system and the organisation.
o Example: Identifying if the activity caused any disruptions or data
breaches.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the network activity and the involved IPs.
o Example:
Shodan: Investigate the destination IP 203.0.113.5 for any known
vulnerabilities or malicious activities.
Censys: Examine the services and configurations associated with
the destination IP.
GreyNoise: Check if the source IP 192.168.1.100 is involved in any
known scanning or attack activities.
2. Traffic Pattern Analysis
o Explanation: Analyse the pattern of the network activity to detect any
anomalies or malicious intent.
o Example: Reviewing traffic flow and behaviour to understand if the
activity is consistent with a known attack pattern.
5. Containment and Mitigation
1. Block Malicious IPs
o Explanation: If the involved IPs are confirmed malicious, block them to
prevent further unusual activity.
o Example: Adding 203.0.113.5 to the firewall block list.
2. Enhance Network Security
o Explanation: Ensure the network has strong security mechanisms to
detect and block unusual activities.
o Example: Implementing network intrusion detection systems (NIDS) and
monitoring tools.
3. Identify Other Unusual Activities
o Explanation: Check if other systems are experiencing similar unusual
network activity.
o Example: Searching network logs for other instances of high-volume
traffic to 203.0.113.5.
6. Eradication
1. Remove Malicious Connections
o Explanation: Ensure any malicious connections resulting from the
unusual activity are terminated.
o Example: Terminating any ongoing connections between 192.168.1.100
and 203.0.113.5.
2. Verify Network Integrity
o Explanation: Confirm that the network is secure and functioning
correctly before allowing normal operations.
o Example: Reviewing network logs and configurations to ensure there are
no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured network to normal
operations and monitor for any further issues.
o Example: Restoring network connectivity and monitoring for any signs of
unusual activity.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
Firewall Logs:
Jul 28 12:00:00 Firewall: High volume of traffic from 192.168.1.100 to 203.0.113.5
Jul 28 12:00:05 Firewall: Traffic continued at high volume
Network Logs:
Jul 28 12:00:00 Network: Unusual network activity detected from 192.168.1.100 to
203.0.113.5
Jul 28 12:00:05 Network: Activity persists at high volume
Example Alert 10: Unauthorised Access Attempt Detected
1. Initial Alert Triage
1. Review Alert Details
o Explanation: Examine the alert to understand the source, targeted
system, and the time of detection.
o Example: Source IP: 192.168.1.150, Target System: FileServer, Time:
2024-07-28 14:00:00.
2. Prioritise the Alert
o Explanation: Assess the criticality based on the nature of the access
attempt and the potential impact.
o Example: High-priority if the targeted system contains sensitive data or
critical infrastructure.
2. Data Collection
1. Gather Access Logs
o Explanation: Collect relevant logs to analyse the unauthorised access
attempt.
o Example Logs:
File Server Logs:
Jul 28 14:00:00 FileServer: Unauthorised access attempt from
192.168.1.150
2. Analyse User Activity
o Explanation: Use OSINT tools to gather information about the source of
the access attempt.
o Example: Checking if 192.168.1.150 is associated with any known
malicious activities using OSINT tools like Shodan, Censys, and
GreyNoise.
3. Initial Analysis
1. Check Access Patterns
o Explanation: Analyse the access patterns to identify if it is truly
unauthorised.
o Example: Reviewing access logs to determine if the attempt was outside
normal user behaviour.
2. Assess Impact
o Explanation: Evaluate the potential impact of the unauthorised access
attempt on the system and the organisation.
o Example: Identifying if the attempt caused any disruptions or data
breaches.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o Explanation: Use various OSINT tools to gather more information about
the source IP and its activities.
o Example:
Shodan: Investigate the source IP 192.168.1.150 for any known
vulnerabilities or malicious activities.
Censys: Examine the services and configurations associated with
the source IP.
GreyNoise: Check if the source IP 192.168.1.150 is involved in any
known scanning or attack activities.
2. Access Pattern Analysis
o Explanation: Analyse the pattern of the access attempt to detect any
anomalies or malicious intent.
o Example: Reviewing access logs and behaviour to understand if the
attempt is consistent with a known attack pattern.
5. Containment and Mitigation
1. Block Malicious IPs
o Explanation: If the source IP is confirmed malicious, block it to prevent
further unauthorised access attempts.
o Example: Adding 192.168.1.150 to the firewall block list.
2. Enhance System Security
o Explanation: Ensure the targeted system has strong security
mechanisms to detect and block unauthorised access attempts.
o Example: Implementing multi-factor authentication and monitoring tools
on FileServer.
3. Identify Other Unauthorised Attempts
o Explanation: Check if other systems are experiencing similar
unauthorised access attempts.
o Example: Searching access logs for other instances of attempts from
192.168.1.150.
6. Eradication
1. Remove Malicious Connections
o Explanation: Ensure any malicious connections resulting from the
unauthorised access attempt are terminated.
o Example: Terminating any ongoing connections between FileServer and
192.168.1.150.
2. Verify System Integrity
o Explanation: Confirm that the system is secure and functioning correctly
before allowing normal operations.
o Example: Reviewing system logs and configurations to ensure there are
no remaining issues.
7. Recovery
1. Restore Operations
o Explanation: Reconnect the cleaned and secured system to normal
operations and monitor for any further issues.
o Example: Restoring access to FileServer and monitoring for any signs of
unauthorised access attempts.
2. Communication
o Explanation: Inform relevant stakeholders about the incident and the
remediation steps taken.
o Example: Providing a detailed incident report to the IT and security
teams, outlining the steps taken and any improvements made.
Raw Logs for Easy Understanding
File Server Logs:
Jul 28 14:00:00 FileServer: Unauthorised access attempt from 192.168.1.150
Jul 28 14:00:05 FileServer: Access denied to 192.168.1.150
Firewall Logs:
Jul 28 14:00:00 Firewall: Blocked access attempt from 192.168.1.150 to FileServer
Jul 28 14:00:05 Firewall: Continued block on 192.168.1.150
SIMULATION
Simulation Alert: Suspicious Network Activity Detected
1. Initial Alert Triage
1. Review Alert Details
o Source IP: 192.168.1.50
o Destination IP: 203.0.113.5
o Activity: High volume of outbound traffic
o Time: 2024-07-28 10:00:00
2. Prioritise the Alert
o High priority due to potential data exfiltration or communication with a
command and control server.
2. Data Collection
1. Gather Network Logs
o Logs:
Jul 28 10:00:00 Firewall: High volume of traffic from 192.168.1.50 to
203.0.113.5
Jul 28 10:00:05 Firewall: Continued high volume of traffic from
192.168.1.50 to 203.0.113.5
2. Analyse Traffic Patterns
o Use OSINT tools to gather information about the destination IP
(203.0.113.5).
3. Initial Analysis
1. Check Traffic Volume
o Normal outbound traffic is usually below 100 MB/hr; current traffic is 1
GB/hr.
2. Assess Impact
o Determine if any sensitive data was transferred.
4. Deep Dive Analysis
1. OSINT Tools for Investigation
o VirusTotal: The IP 203.0.113.5 is associated with a known command and
control server.
o Shodan: The IP has ports 80 and 443 open, indicating possible web
services.
o GreyNoise: The source IP 192.168.1.50 is not involved in any known
malicious activities.
2. Traffic Pattern Analysis
o The traffic consists mainly of large data transfers over HTTP and HTTPS.
5. Containment and Mitigation
1. Block Malicious IPs
o Add 203.0.113.5 to the firewall block list.
2. Enhance Network Security
o Implement network intrusion detection systems (NIDS) and additional
monitoring tools.
3. Identify Other Unusual Activities
o Searching network logs for other instances of high-volume traffic to
203.0.113.5.
6. Eradication
1. Remove Malicious Connections
o Terminate any ongoing connections between 192.168.1.50 and
203.0.113.5.
2. Verify Network Integrity
o Reviewing network logs and configurations to ensure there are no
remaining issues.
7. Recovery
1. Restore Operations
o Restoring network connectivity and monitoring for any signs of unusual
activity.
2. Communication
o Providing a detailed incident report to the IT and security teams, outlining
the steps taken and any improvements made.
Raw Logs for Easy Understanding
Firewall Logs:
Jul 28 10:00:00 Firewall: High volume of traffic from 192.168.1.50 to 203.0.113.5
Jul 28 10:00:05 Firewall: Continued high volume of traffic from 192.168.1.50 to
203.0.113.5
Jul 28 10:00:10 Firewall: Blocked traffic from 192.168.1.50 to 203.0.113.5
Network Logs:
Jul 28 10:00:00 Network: Unusual network activity detected from 192.168.1.50 to
203.0.113.5
Jul 28 10:00:05 Network: Activity persists at high volume
Jul 28 10:00:10 Network: Blocked traffic from 192.168.1.50 to 203.0.113.5
OSINT Tools Results
1. VirusTotal
o Query: 203.0.113.5
o Result: IP associated with a known command and control server.
2. Shodan
o Query: 203.0.113.5
o Result: Ports 80 and 443 open.
3. GreyNoise
o Query: 192.168.1.50
o Result: No known malicious activities.
Isolation Steps
1. Block the Malicious IP
o Firewall Rule: Add a rule to block traffic to and from 203.0.113.5.
iptables -A INPUT -s 203.0.113.5 -j DROP
iptables -A OUTPUT -d 203.0.113.5 -j DROP
2. Terminate Ongoing Connections
o Command: Terminate any active sessions between 192.168.1.50 and
203.0.113.5.
netstat -an | grep 203.0.113.5
kill <PID>
Root Cause Analysis (RCA)
Incident Summary: On July 28, 2024, at 10:00:00, a suspicious network activity alert
was triggered due to a high volume of outbound traffic from 192.168.1.50 to
203.0.113.5, suggesting potential data exfiltration or communication with a command
and control server.
Root Cause
1. Compromised Endpoint
o Source: The endpoint with IP 192.168.1.50 was compromised, possibly
due to malware infection.
o Mechanism: The compromised endpoint began communicating with a
known command and control server at 203.0.113.5.
2. Data Exfiltration
o Impact: High volume of data being transferred, indicating possible data
exfiltration.
Contributing Factors
1. Insufficient Endpoint Security
o Lack of advanced endpoint protection may have allowed the malware to
compromise the system.
2. Delayed Detection
o The suspicious activity was detected after a significant volume of data
had already been transferred.
Corrective Actions
1. Improve Endpoint Security
o Action: Deploy advanced endpoint protection solutions and conduct
regular security audits.
o Timeline: Immediate and ongoing.
2. Enhance Network Monitoring
o Action: Implement network intrusion detection systems (NIDS) and
continuous network traffic analysis.
o Timeline: Immediate and ongoing.
3. Conduct Security Awareness Training
o Action: Provide regular training to employees on recognising and
responding to phishing attempts and other attack vectors.
o Timeline: Quarterly.
Preventive Measures
1. Regular Security Audits
o Conduct regular security audits and penetration testing to identify and
mitigate vulnerabilities.
2. Continuous Monitoring and Response
o Implement a continuous monitoring and incident response strategy to
quickly detect and respond to suspicious activities.
3. Update and Patch Management
o Ensure all systems and applications are regularly updated and patched to
protect against known vulnerabilities.