A SOC Analyst’s tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks including Phishing Email Analysis & Brand Monitoring to fasten the incident response. The main goal of utilizing this tool is to automate as many validation points as possible being performed by Enterprise Security Operations Team while working on any security incident including brand monitoring and possible phishing attack.
The tool also implements encryption(symmetric) so all your API keys are secret & safe and cannot be manipulated until the secret encryption key is used. You can anytime however edit your API keys if you have access to encryption key.
This tool can currently perform below tasks :
pip install -r requirements.txt
The script is simple to understand and use. It can be utilized to its full functionality without opening/editing source code. Isn’t that great?
Here is how we achieved this :
In order to start utilizing the tool, you just need to clone this repository.
git clone https://github.com/AzharAnwar9/Security-Event-Analysis-Automation-Tool/
Once cloned successfully, change directory to Security-Event-Analysis-Automation-Tool/Security Analysis Automation/.
Install all dependencies through requirements.txt file.
pip install -r requirements.txt
Once the dependencies are installed successfully, the tool is ready for use. Run the script by executing
python main_file.py
Upon successful execution of script for the first time, you will be directed to import your API Keys in to the tool. Check Requirements.txt step number 3 to generate the API Keys and import them during runtime.
Once the API keys are successfully imported into the tool, the tool is ready to use. Simply navigate through the command options and perform almost all validation checks as you go along your security incident response process.
A simpler view of menu is given below for assistance :
1. Reputation/Blocklist Check (IPs, Domains, URLs, Hashes)
- Enter Respective entity to check for its reputation.
2. DNS/WHOIS Lookup Options
i. Reverse DNS Lookup
ii. DNS Lookup
iii. WHOIS Lookup
iv. ISP Lookup
3. Email Security (Phishing Email Analysis)
i. Email Address Verification
ii. Analyze a Phishing Site
iii. Sandbox an Email Attachment
iv. Email Header Analysis
v. General GUidelines for Identification of Phishing Attack
4. URL Decoding for Investigation
i. Simple URL Decoder - UTF-8
ii. Base64 Decoder
iii. Office365 SafeLink Decoder
iv. UnShorten the URL
5. File Upload for Sandboxing
6. Sanitization of IOCs for email
i. Single Input
ii. Upload a file with multiple values(Bulk Upload)
7. Brand Monitoring & Analysis
i. Check for Geography of URL
ii. Check for main UI of URL/Social Media Account/Mobile App
iii. Check for URL Reputation
8. Help & Configuration/Re-configuration
i. Help Menu
ii. Configure or Re-configure API Keys
If you have any valuable suggestions & changes to add, feel free to make a pull request. Your contribution to the project is as important and appriciated as the inital release and I will make sure these are implemented with validation.
This is the First Version of tool. Below are few planned future updates :