Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 1016 Bytes

README.md

File metadata and controls

36 lines (23 loc) · 1016 Bytes

Hunting – Playbooks

Threat Hunting is rarely repeatable with predictable outcomes. This is my attempt to enable threat hunters to take a step in that direction.

Getting Started

The playbooks are organized into the following fashion:

Purpose:

What is the reson for this playbook

Data Required:

Which messages / event sources are needed

Collection Considerations:

Notable observations and cares when collecting information

Analysis Techniques:

A simple walkthrough the procedure

Description

Thorough discussion on the playbook's contents.

Other Notes

Miscellanous information in parallel

More Info

Where may one find additional information?

Which tools do the playbooks leverage?

WMIC, Powershell, OSQuery, Kubernetes, Docker, AWS, Aliyun, Azure, GCP, Carbon Black, Anomali, VirusTotal, Fidelis