Home Forums Tips And Tricks Top 10 Standard IOC and TTPs for SOC

Tagged: ,

  • Top 10 Standard IOC and TTPs for SOC

    Posted by Mynk0x00  on April 23, 2024 at 1:55 pm

    Here is standard top ten common Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) that SOC analysts often encounter over the period.

    A: Indicators of Compromise (IOCs):

    1.#Malicious IP Addresses: IP addresses associated with known command and control (C2) servers or malicious activities.

    2. #Malware Hashes: Hashes of malicious files used in attacks, such as viruses or Trojans.

    3. #Domain Names: Suspicious or typo-squatting domains used for phishing or C2 communication.

    4. #URLs: Links to malicious websites or payloads, often delivered through phishing emails.

    5. #Email Addresses: Addresses used in phishing campaigns or to receive stolen data.

    6. #File Paths: Unusual or suspicious file paths on systems or servers.

    7. #Registry Keys: Unauthorized or malicious registry keys that may indicate compromise.

    8. #User-Agent Strings: Uncommon or malicious user-agent strings in HTTP requests.

    9. #YARA Signatures: Custom rules used to detect specific patterns or characteristics in files.

    10. #Behavioral Anomalies: Unusual behavior, like excessive data exfiltration or unusual system activities.

    B: Tactics, Techniques, and Procedures (TTPs):

    1. #Phishing: Attackers use deceptive emails to trick users into revealing sensitive information or executing malicious code.

    2. #Malware Delivery: Sending malicious files via email attachments, compromised websites, or other means.

    3. #Command and Control (C2): Communication between malware and attacker-controlled servers for remote control and data exfiltration.

    4. #Credential Theft: Techniques like keylogging or credential dumping to steal login credentials.

    5. #Lateral Movement: Moving laterally within a network to explore and compromise other systems.

    6. #Privilege Escalation: Gaining higher-level access to systems by exploiting vulnerabilities or misconfigurations.

    7. #Data Exfiltration: Stealing sensitive data and sending it to the attacker-controlled infrastructure.

    8. #Denial of Service (DoS): Overwhelming a system or network to disrupt availability.

    9. #Ransomware: Encrypting data and demanding a ransom for decryption.

    10. #Fileless Attacks: Exploiting legitimate system tools and processes to carry out attacks without leaving traces on disk.

    These IOCs and TTPs are just a starting point, as the threat landscape is constantly evolving.

    Effective SOC analysts should continuously update their knowledge and adapt their detection strategies to new attack techniques by keeping themselves up to date with Applicable threats based on the type of industry.

    Mynk0x00  replied 6 months ago 1 Member · 0 Replies
  • 0 Replies

Sorry, there were no replies found.

Reply to: Mynk0x00
Here is standard top ten common Indicators of Com…
Cancel
Your information:

Start of Discussion
0 of 0 replies June 2018
Now