SOC Investigation Playbooks
Step-by-step investigation guides for the most common alert types in a production SOC. Each playbook includes decision trees, copy-pasteable SIEM queries, common analyst mistakes, and hands-on practice scenarios in SOCSimulator Operations.
What is an Investigation Playbook?
An investigation playbook is a structured, step-by-step guide that tells a SOC analyst exactly what to do when a specific alert fires. Rather than relying on memory or tribal knowledge, playbooks codify the best investigation process for each alert type, covering what data to collect, which queries to run, how to interpret results, and when to escalate. Well-written playbooks reduce mean time to respond (MTTR), ensure consistent analysis quality across analysts with different experience levels, and create a documented audit trail for compliance.
These playbooks are written for working SOC analysts who face real pressure to triage alerts quickly and accurately. Each one follows an answer-first format: the summary at the top gives you the key actions, and the detailed steps walk you through the full investigation. You can practice the scenarios described here inside SOCSimulator Operations rooms or stress-test your speed in Shift Mode. Start free forever, no credit card required.
- Investigation Playbook
- A documented, repeatable procedure that guides SOC analysts through the investigation of a specific alert type, from initial triage to containment or closure. Playbooks standardize the investigation process, reduce analyst error, and ensure consistent response quality across shifts and experience levels.
“Organizations with formal incident response playbooks identify breaches 54 days faster and save an average of $2.66 million per incident compared to those without documented procedures.”
Browse by Category
Identity & Access(3)
IdentityBrute Force Attack Investigation
When authentication logs show repeated failed login attempts against one or more accounts, investigate by identifying the source IP, determining if any attempts succeeded, checking for credential stuffing patterns, and assessing whether the account is now compromised. Block the source IP at the firewall and enforce account lockout policies. Escalate if any login succeeded after the brute force attempt.
Impossible Travel Login Investigation
When authentication logs show a user logging in from two geographically distant locations within a timeframe that makes physical travel impossible, investigate by verifying the user identity, checking for VPN or proxy use, reviewing the device fingerprint, and determining if credentials were compromised. This technique was central to the Scattered Spider campaigns (2023-2024) where attackers used stolen credentials from distant locations to bypass geographic anomaly detection.
MFA Fatigue / Push Bombing Investigation
When authentication logs show repeated MFA push notifications sent to a user in rapid succession, especially outside business hours, investigate for MFA fatigue attacks where an attacker with valid credentials repeatedly triggers push notifications hoping the user will approve one out of frustration or confusion. This technique was used in the Uber breach (September 2022) by the Lapsus$ group, where a contractor approved a push notification after receiving over 100 requests.
Lateral Movement & Discovery(2)
Lateral MovementLateral Movement Investigation
When alerts indicate unusual internal connections, RDP to servers from workstations, PsExec executions, or SMB access to file shares from unexpected hosts, investigate by mapping the movement path, identifying the initial compromise point, checking for credential harvesting, and assessing the scope of accessed systems. Lateral movement is almost always part of a larger attack chain and warrants immediate escalation.
Kerberoasting Attack Investigation
When SIEM detects an unusual volume of Kerberos TGS ticket requests (Event ID 4769) with RC4 encryption from a single account, investigate for Kerberoasting. This Active Directory attack requests service tickets for accounts with Service Principal Names, then cracks them offline to obtain plaintext passwords. Used by APT29 (Cozy Bear), FIN7, and virtually every ransomware group that operates in Active Directory environments. The cracked service account passwords often provide domain admin access.
Exfiltration & Impact(2)
ExfiltrationRansomware Activity Investigation
When indicators suggest ransomware, mass file encryption, suspicious process behavior, ransom notes, or shadow copy deletion, immediately isolate affected systems to prevent lateral spread. Investigate the attack timeline to determine initial access, scope of encryption, data exfiltration evidence, and which backups are intact. Ransomware investigations are time-critical; every minute of delay means more encrypted files.
Data Exfiltration Investigation
When monitoring detects large outbound data transfers, unusual cloud storage uploads, or archive file creation on sensitive systems, investigate for data exfiltration. The MOVEit Transfer vulnerability exploitation by the Cl0p ransomware group (May-June 2023) resulted in data theft from over 2,600 organizations affecting 77 million individuals, demonstrating that exfiltration can be massive, automated, and completed before detection. Identify what data was taken, how it left the network, and the full scope of exposure.
Malware & Execution(4)
MalwareSuspicious Process Execution Investigation
When XDR or EDR alerts on suspicious process execution, unusual parent-child relationships, encoded command lines, or processes spawning from unexpected locations, investigate by analyzing the full process tree, checking the binary hash against threat intelligence, examining command-line arguments for malicious intent, and determining if the execution is part of a larger attack chain. Look at what happened before and after the process executed.
Cobalt Strike Beacon Detection & Investigation
When network or endpoint detection tools alert on periodic HTTP/HTTPS beaconing, named pipe creation, or process injection consistent with Cobalt Strike, investigate immediately. Cobalt Strike is the most commonly used post-exploitation framework by both penetration testers and threat actors. It was used in the SolarWinds SUNBURST attack (2020), the Colonial Pipeline ransomware (2021), and by APT29 (Cozy Bear) campaigns. Confirm the beacon, identify the C2 server, map all infected hosts, and contain before lateral movement begins.
Macro-Enabled Document Malware Investigation
When XDR detects a Microsoft Office process spawning scripting interpreters, Word launching PowerShell, Excel spawning cmd.exe, or similar, investigate for macro-based malware delivery. This remains one of the most prolific initial access methods despite Microsoft disabling macros by default in 2022. Emotet, the most successful malware distribution network (disrupted 2021, resurrected 2022-2023), relied almost exclusively on macro-enabled documents to infect over 1.6 million systems globally.
Supply Chain Compromise Investigation
When trusted software updates or third-party tools exhibit unexpected behavior, making unusual network connections, spawning unexpected processes, or accessing sensitive data, investigate for supply chain compromise. The SolarWinds SUNBURST attack (2020) and the 3CX supply chain attack (March 2023) demonstrated that even signed, legitimate software can be weaponized. These attacks are exceptionally dangerous because the malicious code arrives through trusted update channels, bypassing most security controls.
Network & Infrastructure(2)
NetworkCommand and Control (C2) Traffic Investigation
When network monitoring detects periodic outbound connections to suspicious external hosts, unusual DNS patterns, or traffic matching known C2 signatures, investigate for command and control communications. The SolarWinds SUNBURST backdoor (discovered December 2020) communicated with its C2 via DNS queries to avsvmcloud.com, demonstrating that C2 can hide in normal-looking traffic for months. Identify the protocol, map all communicating hosts, and contain before the attacker can execute their objectives.
DNS Tunneling Investigation
When DNS monitoring detects anomalous query patterns, high-entropy subdomains, unusually long query strings, excessive TXT record requests, or high query volume to a single domain, investigate for DNS tunneling. Attackers encode data in DNS queries and responses to exfiltrate data or maintain C2 channels that bypass firewalls and web proxies. The APT34 (OilRig) group and the DNSMessenger backdoor are notable real-world examples of DNS tunneling for espionage and persistent access.
Frequently Asked Questions
- What is an investigation playbook?
- An investigation playbook is a structured, step-by-step guide that tells a SOC analyst exactly what to do when a specific alert type fires. It covers what data to collect, which SIEM queries to run, how to interpret results, decision trees for escalation, and documentation requirements. Playbooks reduce mean time to respond (MTTR) and ensure consistent analysis quality across analysts of all experience levels.
- How do SOC analysts use playbooks?
- SOC analysts open the relevant playbook when an alert fires, then follow the investigation steps in order. Each step tells them which tool to use (SIEM, XDR, or Firewall), provides copy-pasteable queries, and includes decision points that branch the investigation based on findings. Analysts document their results at each step and use the escalation criteria to determine if the alert needs Tier 2 or incident response involvement.
- What makes a good incident response playbook?
- A good incident response playbook is specific enough to be actionable but flexible enough to handle variations. It should include an answer-first summary for quick reference, concrete SIEM queries (not just descriptions), clear decision trees at each stage, common mistakes to avoid, and explicit escalation criteria. The best playbooks are tested against real incidents and updated regularly based on lessons learned.
- Are these playbooks free to use?
- Yes, all investigation playbooks on SOCSimulator are free to read and reference. The playbooks include real SIEM queries in SPL (Splunk), KQL (Microsoft Sentinel), and Lucene (Elastic) formats. You can also practice the scenarios described in each playbook inside SOCSimulator Operations rooms, which are free forever with no credit card required.
- How often are the playbooks updated?
- Playbooks are reviewed and updated quarterly to reflect evolving threat landscapes, new attack techniques, and changes in SIEM query syntax. Each playbook is mapped to MITRE ATT&CK techniques and updated when new sub-techniques are published. Community feedback from analysts practicing in SOCSimulator also drives improvements to investigation steps and decision trees.
Practice These Playbooks in a Real SOC Environment
Reading a playbook is one thing. Executing it under pressure is another. SOC Simulator puts you in the analyst seat with realistic alerts, real SIEM interfaces, and zero consequences. Build the muscle memory to respond fast and accurately. Start free forever.