Automate security workflows by integrating LimaCharlie (EDR) with Tines (SOAR) for real-time threat detection and response. Learn how to configure, deploy, and enhance your cybersecurity posture with automation.
-
SOAR (Security Orchestration, Automation, and Response)
- Description: SOAR platforms automate security workflows by integrating various security tools, enabling faster and more efficient incident response.
- Use Case: Automating phishing email analysis by extracting indicators, checking them against threat intelligence feeds, and triggering a response.
-
EDR (Endpoint Detection and Response)
- Description: EDR solutions continuously monitor endpoints for suspicious activities, detect threats in real-time, and provide automated or manual response options.
- Use Case: Detecting a compromised laptop executing malicious scripts and automatically isolating it from the network.
-
Tines (SOAR Platform)
- Description: A no-code SOAR platform that enables security teams to create automated workflows for incident response, threat intelligence, and security monitoring.
- Use Case: Automating security alert triage by collecting data from SIEMs, enriching it with threat intelligence, and escalating critical alerts.
-
LimaCharlie (EDR & Security Infrastructure)
- Description: A cloud-native security operations platform providing EDR, log collection, automation, and security tooling as a service.
- Use Case: Deploying LimaCharlie agents across an enterprise to detect and respond to endpoint threats in real-time.
-
Slack (Collaboration & Incident Communication)
- Description: A messaging platform used by security teams for real-time collaboration, alerting, and incident response coordination.
- Use Case: Integrating Slack with SOAR tools like Tines to automatically notify security teams when a critical security event occurs.
-
Playbook (Incident Response Workflow)
- Description: A structured set of predefined steps and actions that security teams follow to investigate and respond to specific security incidents.
- Use Case: A phishing incident response playbook that includes automated email analysis, URL detonation, and employee notifications.
-
Telemetry (Security Data Collection & Analysis)
- Description: The continuous collection, processing, and analysis of security-related data from various sources, such as endpoints, networks, and cloud environments.
- Use Case: Using endpoint telemetry to detect and investigate anomalies, such as unauthorized process executions or unusual network connections.
-
LaZagne (Credential Extraction Tool)
- Description: An open-source tool designed to retrieve stored passwords from various applications, including browsers, databases, and Wi-Fi networks.
- Use Case: Running LaZagne on a compromised endpoint to extract stored credentials and assess the impact of a security breach.
-
- Create a playbook workflow
- Brainstorm playbook actions
-
- Install and Setup LimaCharlie
- Confirm Events
-
- Generate Telemetry using LaZagne
- Create Detection & Response Rule
-
- Setup Slack and Tines
- Test Connection (LimaCharIie + Tines)
-
- Send a Slack message
- Send an Email
- Containing information about the detection
- Generate a user prompt
- Isolate the machine? (Yes/No)
- If YES - Isolate
-
- Generate telemetry by executing
LaZagne.exe
. - An alert is generated in LimaCharlie.
- LimaCharlie sends the output to Tines.
- Tines distributes the output to Slack and Email.
- Tines prompt the user to decide whether to isolate the machine (
Yes/No
). - If the user selects No, the machine is not isolated, and an alert is sent to Slack.
- If the user selects Yes, the machine is isolated (unable to access the internet), and an alert is sent to Slack.
- Generate telemetry by executing
Use draw.io to draw following diagram as below:
Here’s your instruction with corrected grammar and clarity:
- Set up a Windows 10 VM on VirtualBox or VMware.
- Open a browser inside the Windows 10 VM and create an account at LimaCharlie.
- After logging in to LimaCharlie, create an organization.
- On the left-hand side, click on Sensors → Installation Keys → Click on Create Installation Key.
- In the Description field, enter any name and click the Create button.
- You will see a key generated with the name you entered in the Description field.
- Scroll down on the same page until you find Sensors Download.
- Under EDR, right-click on Windows 64-bit, copy the link, and paste it into a new tab to download the agent.
- Scroll back up and copy the Sensor Key from the generated Installation Key.
- Open PowerShell as Administrator, then navigate to the directory where the agent was downloaded.
- Run the following command:
(Replace
your-agent-file.exe -i paste-sensor-key
your-agent-file.exe
with the actual filename andpaste-sensor-key
with the copied Sensor Key.) - To verify that the agent was installed successfully:
- Go back to LimaCharlie in the browser.
- Under Sensors, click on Sensors List.
- If everything was done correctly, your Windows 10 VM's desktop name should appear in the list.
Here’s your content with corrected grammar and improved clarity:
-
Download LaZagne
- Visit the LaZagne GitHub page.
- Navigate to Releases and download the
LaZagne.exe
file in your Windows 10 VM.
-
Execute LaZagne
- Open PowerShell as Administrator.
- Navigate to the directory where the
LaZagne.exe
file is downloaded. - Run the executable, and you should see an output similar to the one below:
-
Verify Telemetry in LimaCharlie
- Open the browser and go to LimaCharlie.
- Navigate to Sensors → Sensors List.
- Click on your Windows 10 desktop name.
- Go to Timelines and search for
"lazagne"
.
-
Create a Detection & Response (D&R) Rule
- Navigate to your organization page → Automation → D&R Rules → New Rule.
- Name the rule as desired.
- Under Detect, enter the following configuration:
events: - NEW_PROCESS - EXISTING_PROCESS op: and rules: - op: is windows - op: or rules: - case sensitive: false op: ends with path: event/FILE_PATH value: LaZagne.exe - case sensitive: false op: contains path: event/COMMAND_LINE value: LaZagne - case sensitive: false op: is path: event/HASH value: 'PASTE-YOUR-HASH-WE-SEEN-IN-STEP-3'
- Replace PASTE-YOUR-HASH-WE-SEEN-IN-STEP-3 with the actual hash observed in Step 3.
- In this example, the hash value is:
(Your hash will be different.)
467e49f1f795c1b08245ae621c59cdf06df630fc1631dc0059da9a032858a486
-
Define the Response Action
- In the Respond field, enter the following:
- action: report metadata: author: YOUR NAME description: TEST - Detects LaZagne Usage falsepositives: - ToTheMoon level: high tags: - attack.credential_access name: YOUR NAME - HackTool - LaZagne
-
Create the Rule
- Click the Create button to finalize the D&R rule.
-
Test the Rule with a Sample Event
- Scroll down to Target Event on the same page.
- Paste the event found in Step 3.
- Click Test Event.
-
Verify Rule Execution
- If configured correctly, clicking Test Event should yield the following output:
-
Trigger an Alert
- Open PowerShell again and execute the
LaZagne.exe
file. - Go back to LimaCharlie → Organization Page → Detection.
- You should see an alert similar to this:
- Open PowerShell again and execute the
-
Troubleshooting: Missing VM in LimaCharlie Sensors
- If your Windows 10 VM is not appearing in the Sensors List, and no alerts/logs are being generated:
- Open Services in Windows 10 VM.
- Restart the LimaCharlie process.
- If your Windows 10 VM is not appearing in the Sensors List, and no alerts/logs are being generated:
This should resolve the issue and allow your sensor to appear in LimaCharlie.
Here's the corrected version with improved grammar and clarity:
-
Set Up Slack
- Create an account on Slack.
- Create a workspace with any name of your choice.
- Create a channel named
"alerts"
.
-
Configure Tines Webhook
- Create an account on Tines.
- Drag and drop a Webhook component.
- Set the Name to
"Retrieve Detections"
. - Set the Description to
"Retrieve LimaCharlie Detections"
. - Copy the Webhook URL.
-
Integrate LimaCharlie with Tines
- Go to the LimaCharlie Organization Page.
- Scroll down to find Outputs.
- Click Add Output → Detections → Tines.
- Enter a Name of your choice.
- In Destination Host, paste the Webhook URL copied from Tines.
- Click Save Output.
-
Trigger a Detection Event
- Open PowerShell and execute the
LaZagne.exe
file. - Go back to LimaCharlie and click on Refresh Samples.
- You should see an output similar to this:
- Open PowerShell and execute the
-
Verify Alerts in Tines
- In Tines, click on Webhook → Events.
- Select the first event, where alerts have been successfully fetched from LimaCharlie to Tines.
This ensures that LimaCharlie detections are correctly forwarded to Tines for further processing.