Incident Response Platform - TheHive
TheHive is a scalable, open-source Security Incident Response Platform (SIRP) designed to help SOC teams manage, investigate, and respond to security incidents efficiently through structured case management and collaborative workflows.TheHive enables security teams to transform alerts into actionable cases, collaborate on investigations, and track incidents from detection through resolution with full audit trails.
Platform Overview
Case Management
Structured incident tracking with customizable workflows
Collaboration
Multi-user environment with role-based access control
Task Management
Assign and track investigation tasks across team members
Observable Analysis
Automated enrichment and analysis of IOCs
Core Capabilities
Case Management
Organize security incidents with comprehensive case tracking:- Case Structure
- Case Workflow
- Custom Templates
Components of a Case:
- Basic Information:
- Title and description
- Severity level (Low, Medium, High, Critical)
- TLP (Traffic Light Protocol) classification
- PAP (Permissible Actions Protocol)
- Metadata:
- Tags for categorization
- Custom fields
- Timestamps (creation, update, closure)
- Assigned analysts
- Relationships:
- Linked cases
- Related alerts
- Parent/child case hierarchy
Task Management
Break down investigations into manageable tasks:Task Types
Task Types
Common Investigation Tasks:
- Containment: Isolate affected systems
- Analysis: Examine logs, network traffic, files
- Intelligence: Check threat intelligence sources
- Communication: Notify stakeholders
- Documentation: Record findings and actions
- Remediation: Apply fixes and patches
Task Assignment
Task Assignment
Collaboration Features:
- Assign tasks to specific analysts
- Set due dates and priorities
- Track task status (Waiting, InProgress, Completed, Cancel)
- Add task logs for progress updates
- Attach files and screenshots
- Link observables to tasks
Task Automation
Task Automation
Automated Task Creation:
Observables and IOCs
Track and analyze indicators of compromise: Supported Observable Types:Network
- IP addresses
- Domain names
- URLs
- Email addresses
Files
- File hashes (MD5, SHA1, SHA256)
- File names
- File paths
- Registry keys
Other
- User accounts
- Autonomous Systems
- Bitcoin addresses
- Custom types
Observable Enrichment
Integration with Cortex analyzers provides automatic enrichment:- Threat Intelligence
- Technical Analysis
- Custom Analyzers
Intelligence Lookups:
- VirusTotal: File and URL reputation
- AbuseIPDB: IP address reputation
- MISP: Threat intelligence platform
- OTX AlienVault: Open threat exchange
- Shodan: Internet device search
Integration with SOC Architecture
Alert Import from Wazuh
Automatic case creation from SIEM alerts:Wazuh to TheHive Integration
Wazuh to TheHive Integration
Data Flow
- Detection: Wazuh/IDS generates security alert
- Import: Alert automatically created in TheHive
- Triage: Analyst reviews and promotes to case
- Investigation: Observables analyzed via Cortex
- Response: Actions executed via SOAR integration
- Closure: Case documented and archived
Collaboration Features
Multi-Analyst Workflows
Real-time Updates
Live case updates visible to all team members
Comments & Logs
Discussion threads and activity logs
File Attachments
Share evidence, screenshots, and reports
Notifications
Alert assignments and case updates
Role-Based Access Control
- User Roles
- Permissions
- Organizations
Default Roles:
- Admin: Full system administration
- Org-admin: Organizational management
- Analyst: Create and manage cases
- Read-only: View cases and alerts
Reporting and Metrics
Dashboard Analytics
Operational Metrics
Operational Metrics
Key Performance Indicators:
- Cases opened/closed over time
- Mean time to detect (MTTD)
- Mean time to respond (MTTR)
- Mean time to resolve (MTTR)
- Alert-to-case conversion rate
- Cases by severity distribution
Analyst Performance
Analyst Performance
Team Metrics:
- Cases handled per analyst
- Average resolution time
- Task completion rates
- Workload distribution
- Escalation frequency
Threat Metrics
Threat Metrics
Security Insights:
- Top attack types
- Most targeted assets
- Threat actor campaigns
- IOC recurrence
- Geographic threat sources
Report Generation
Best Practices
Case Management
Case Management
- Standardize naming: Use consistent case titles
- Tag appropriately: Enable searching and grouping
- Document thoroughly: Future analysts will thank you
- Link related cases: Track campaign-based attacks
- Set accurate TLP: Protect sensitive information
Investigation Process
Investigation Process
- Follow runbooks: Use templates and checklists
- Preserve evidence: Maintain chain of custody
- Enrich observables: Run all relevant analyzers
- Track time: Log hours for metrics and billing
- Communicate status: Keep stakeholders informed
Team Collaboration
Team Collaboration
- Update case logs: Document progress regularly
- Assign tasks clearly: Define ownership and deadlines
- Share knowledge: Use case comments for insights
- Review closed cases: Learn from past incidents
- Maintain templates: Keep playbooks current
Integration
Integration
- Automate alert import: Reduce manual work
- Configure webhooks: Enable real-time notifications
- Use API extensively: Integrate with other tools
- Regular backups: Protect case data
- Monitor performance: Track API usage and errors
Advanced Features
Custom Fields
Extend cases with organization-specific data:API Integration
TheHive API Documentation
Complete API reference for automation and integration
Official Documentation
TheHive Project
Official project website and documentation
TheHive Documentation
Complete installation and user guides
TheHive4py
Python library for API integration
Community
Community chat for support and discussions
Next Steps
- Configure Automation and SOAR with Cortex for automated response
- Review Incident Handling procedures and playbooks
- Set up SIEM Platform integration for alert import
