Skip to content

w8mej/ThreatPlays

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hunting – Playbooks

Threat Hunting is rarely repeatable with predictable outcomes. This is my attempt to enable threat hunters to take a step in that direction.

Getting Started

The playbooks are organized into the following fashion:

Purpose:

What is the reson for this playbook

Data Required:

Which messages / event sources are needed

Collection Considerations:

Notable observations and cares when collecting information

Analysis Techniques:

A simple walkthrough the procedure

Description

Thorough discussion on the playbook's contents.

Other Notes

Miscellanous information in parallel

More Info

Where may one find additional information?

Which tools do the playbooks leverage?

WMIC, Powershell, OSQuery, Kubernetes, Docker, AWS, Aliyun, Azure, GCP, Carbon Black, Anomali, VirusTotal, Fidelis