The SOC Triad: Free Threat Intelligence for Everyone
- Patrick Duggan
- Nov 19, 2025
- 5 min read
--- title: "The SOC Triad: Free Threat Intelligence for Everyone" date: 2025-11-19 slug: the-soc-triad-free-threat-intelligence-platform excerpt: "Detection Rules, Remediation Playbooks, and Threat Hunt Queries. All free. All production-tested. Multi-SIEM compatible. Get inoculated against internet's unstoppable threats." tags: ["threat-intelligence", "soc", "detection-rules", "cybersecurity", "free-tools"] ---
TL;DR: We just released a complete SOC platform for free. 6 detection rules, 6 remediation playbooks, 8 threat hunt queries. Works with Splunk, Azure Sentinel, Elastic, or whatever SIEM you use. Zero cost. Zero catch. Get it here: analytics.dugganusa.com
The Problem
Cybersecurity is becoming like nuclear weapons—only nation-states and major corporations can afford effective defense. Small businesses, nonprofits, schools? They're defenseless against sophisticated threats.
That's bullshit.
The Solution: Free Inoculation
We built The SOC Triad—a complete threat detection, response, and hunting platform. All free. All production-tested. Multi-SIEM compatible.
The three pieces:
1. Detection Rules - Alert when bad things happen 2. Remediation Playbooks - Fix problems when alerts fire 3. Threat Hunt Queries - Find threats detection missed
Think of it like vaccines. Why hoard them when sharing costs nothing? Digital goods have zero marginal cost. So we're giving them away.
Part 1: Detection Rules
What you get: 6 production-tested detection rules that catch real threats.
Example: Our "High-Confidence Malicious IP" rule catches IPs with abuse scores >15 AND >10 reports. After we accidentally blocked a legitimate user (Paul Galjan) with our old threshold of >5, we raised it and dropped our false positive rate from 63% to 5.96%.
We documented the mistake publicly. Because transparency matters more than looking perfect.
• Sigma YAML (converts to any SIEM)
• Splunk SPL (Search Processing Language)
• KQL (Azure Sentinel / Microsoft Defender)
• JSON (raw metadata)
How to use it:
# Get all detection rules
curl https://analytics.dugganusa.com/api/v1/detection-rules• High-Confidence Malicious IP (FPR: 5.96%)
• VirusTotal Malicious Detection
• Suspicious ISP Keywords (proxy, VPN, bulletproof hosting)
• Young Domain Detection (<90 days old)
• Repeat Offender ISP Pattern
• Cloud Provider Abuse (AWS/Google/Microsoft weaponization)
Part 2: Remediation Playbooks
What you get: Step-by-step response procedures for each detection rule.
Example: When "High-Confidence Malicious IP" fires, the playbook tells you exactly what to do:
1. Verify detection (15 seconds) - Check AbuseIPDB score >15 AND reports >10 2. Check current traffic (2 minutes) - Query firewall logs for active connections 3. Block IP (1 minute) - Add to firewall blocklist 4. Document incident (5 minutes) - Create ticket with details 5. Monitor (1 minute) - Set alert for same IP returning
Total time: 15 minutes from alert to resolution.
• Prerequisites (what access you need)
• Verification steps (confirm it worked)
• Rollback procedures (if it's a false positive)
• Estimated completion time
How to use it:
# Get playbook for specific detection rule
curl https://analytics.dugganusa.com/api/v1/remediation-playbooks/dugganusa-001
Or just use the web UI: analytics.dugganusa.com/#detection-rules - click any rule, switch to the "Remediation Playbook" tab.
Part 3: Threat Hunt Queries
What you get: 8 proactive hunting queries to find what detection missed.
• Detection = passive (alerts fire automatically when bad things happen)
• Hunting = active (you look for threats before they trigger alerts)
Example hunt: "C2 Beaconing Patterns" looks for periodic connections with low variance—a sign of command-and-control malware that's too sophisticated for signature-based detection.
• Bucket connections by hour
• Calculate average and standard deviation
• Flag connections with low variance (periodic beaconing)
• At least 24 hours of beacons = likely C2
• Splunk SPL
• KQL (Azure Sentinel)
• ElasticSearch DSL
• SQL (generic SIEM databases)
• JSON (metadata)
Queries included: 1. Suspicious Authentication Patterns (brute force, credential stuffing) 2. Data Exfiltration Indicators (>1GB uploads to Dropbox/Mega) 3. Lateral Movement Detection (PSExec, WMI, RDP pivoting) 4. Privilege Escalation Attempts (UAC bypass, token manipulation) 5. C2 Beaconing Patterns (periodic connections) 6. Anomalous Outbound Traffic (DGA domains, high entropy) 7. Credential Dumping Activity (LSASS access, mimikatz) 8. Living Off the Land Binaries (certutil, bitsadmin abuse)
How to use it:
# Get all hunt queries
curl https://analytics.dugganusa.com/api/v1/threat-hunt-queriesHow They Work Together
Scenario 1: Detection → Response 1. "High-Confidence Malicious IP" detection rule fires 2. You open the remediation playbook 3. Follow 5 steps, resolve in 15 minutes
Scenario 2: Hunting → Detection 1. Run "C2 Beaconing Patterns" hunt query 2. Find suspicious domain with periodic connections 3. Create new detection rule for that domain 4. Future C2 beacons trigger alerts automatically
Scenario 3: Incident → Knowledge 1. Incident occurs (like when we blocked Paul Galjan) 2. Update remediation playbook with better verification steps 3. Adjust detection rule threshold (>5 → >15) 4. Document publicly so others don't repeat the mistake
Multi-SIEM Compatible
We're not trying to lock you into our platform. Use whatever SIEM you already have:
• Splunk Enterprise Security - Import SPL queries directly
• Microsoft Azure Sentinel - Import KQL queries
• Elastic Security - Import ElasticSearch DSL
• IBM QRadar, Rapid7, LogRhythm - Import SQL queries
• Any other SIEM - Convert Sigma YAML to your format
Philosophy: Zero marginal cost for digital goods. We spent the time building these. Sharing them costs us nothing. Why be a greedy asshole?
Production-Tested Intelligence
These aren't theoretical rules. They come from our live auto-blocking system that has:
• Blocked 1,500+ malicious IPs in 90 days
• Processed data from 7 threat intel sources (AbuseIPDB, VirusTotal, ThreatFox, GreyNoise, IPQualityScore, Cloudflare, MISP)
• Generated 559 STIX 2.1 indicators with full provenance
• Achieved 94.04% precision after expert-curation
We eat our own dog food. These rules protect our production infrastructure right now.
The Democratic Sharing Law
We operate under the Democratic Sharing Law, which means:
• 99.5% public sharing - 4,780 files publicly available
• Zero hoarding - No proprietary lock-in
• 7.1x evidence:claims ratio - Receipts for every assertion
• Free for non-commercial use - Commercial use requires attribution only
"The Aristocrats Standard": Admit mistakes, show receipts, thank those wronged, fix publicly.
When we blocked Paul Galjan (false positive), we: 1. Unblocked him immediately 2. Documented the incident publicly 3. Adjusted the detection threshold 4. Measured the improvement (63% FPR → 5.96%) 5. Published the fix for everyone
Get Started in 60 Seconds
Option 1: Web UI
Visit analytics.dugganusa.com
• Click "Detection Rules" in left nav
• Browse 6 rules with filters
• Click any rule → Export in your SIEM format
• Switch to "Remediation Playbook" tab for response procedures
Option 2: Direct API
# Detection Rules
curl https://analytics.dugganusa.com/api/v1/detection-rulesOption 3: GitHub
All documentation is in our public repo: github.com/pduggusa/enterprise-extraction-platform
• `/docs/detection-rules/` - Rule documentation
• `/docs/remediation-playbooks/` - Playbook guides
• `/docs/threat-hunt-queries/` - Hunt methodologies
Why Free?
Short answer: Because we can.
Long answer: Building this cost us time. But sharing it costs us nothing. Digital goods have zero marginal cost. Hoarding threat intelligence doesn't make us money—it just makes the internet less safe.
• Open source security tools
• Public threat intelligence feeds
• Community malware analysis
• Researchers who share vulnerabilities
Paying it forward is the least we can do.
The Burevestnik Problem
Russia's 9M730 Burevestnik is a nuclear-powered cruise missile with unlimited range. Traditional air defense can't stop it. It's the ultimate unstoppable threat.
• Nation-state APT groups with unlimited budgets
• Ransomware gangs with criminal infrastructure
• Zero-days that bypass all signatures
• Sophisticated C2 frameworks that evade detection
Our answer: Free inoculation. If everyone has access to production-tested threat intelligence, the playing field levels. Small businesses get the same defenses as enterprises. Nonprofits get the same protection as Fortune 500s.
You can't stop a Burevestnik with a single missile defense system. But if everyone has defenses, the threat becomes manageable.
What's Next?
• More detection rules (as we encounter new threats)
• More playbooks (as we respond to incidents)
• More hunt queries (as we discover new TTPs)
Everything will stay free. Everything will stay open. Everything will stay production-tested.
Democratic Sharing Law in action.
Get Inoculated
Public site: https://analytics.dugganusa.com
• Detection Rules: `/api/v1/detection-rules`
• Remediation Playbooks: `/api/v1/remediation-playbooks`
• Threat Hunt Queries: `/api/v1/threat-hunt-queries`
• STIX Feed: `/api/v1/stix-feed`
Press release: dugganusa.com/press-release
Contact: [email protected]
The SOC Triad is live. Get protected. Stay protected. Help others get protected.
Standing on shoulders, not being a greedy asshole.
— DugganUSA LLC (Minnesota)




Comments