Initial SOC memory POC implementation
This commit is contained in:
36
evaluation/datasets/normalized_kb/PB-O365-LOGIN-001.json
Normal file
36
evaluation/datasets/normalized_kb/PB-O365-LOGIN-001.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "PB-O365-LOGIN-001",
|
||||
"memory_type": "knowledge",
|
||||
"doc_type": "playbook",
|
||||
"scenario": "o365_suspicious_login",
|
||||
"title": "O365 Suspicious Login Investigation Playbook",
|
||||
"abstract": "Standard investigation steps for suspicious Entra ID sign-ins, impossible travel, MFA abuse, and follow-on mailbox abuse.",
|
||||
"key_points": [
|
||||
"Confirm user travel and business context.",
|
||||
"Review sign-in logs, device IDs, and user agents.",
|
||||
"Inspect downstream actions such as inbox rules, app consent, and forwarding."
|
||||
],
|
||||
"investigation_guidance": [
|
||||
"Correlate MFA telemetry with sign-in sequence.",
|
||||
"Check risky sign-ins and risky users views.",
|
||||
"Revoke sessions and reset credentials when compromise is confirmed."
|
||||
],
|
||||
"decision_points": [
|
||||
"Impossible travel alone is insufficient without corroborating evidence.",
|
||||
"Inbox rule creation after foreign login strongly increases confidence of compromise."
|
||||
],
|
||||
"related_refs": {
|
||||
"kb": [
|
||||
"KB-O365-IMPOSSIBLE-TRAVEL",
|
||||
"KB-O365-MFA-FATIGUE",
|
||||
"KB-O365-INBOX-RULE-ABUSE"
|
||||
],
|
||||
"cases": []
|
||||
},
|
||||
"source_path": "/home/tom/soc_memory_poc/evaluation/datasets/mock_kb/playbooks/PB-O365-LOGIN-001.json",
|
||||
"tags": [
|
||||
"playbook",
|
||||
"o365",
|
||||
"login"
|
||||
]
|
||||
}
|
||||
Reference in New Issue
Block a user