Lesson 2 of 5·16 min read·Includes quiz

TheHive & Case Management

Cases, tasks, observables, Cortex analyzers, case templates, MISP integration

What You'll Learn

  • Explain why case management is essential for structured incident response — tracking, collaboration, accountability, and audit trail
  • Navigate TheHive's interface: Dashboard, Cases, Observables, Tasks, and Case Templates
  • Create and manage cases with proper severity, TLP, PAP, and tag assignments
  • Add observables (IPs, domains, hashes, emails, filenames) to cases and understand observable types and data types
  • Assign tasks to team members, track task status, and use task logs for work documentation
  • Build case templates for common incident types to standardize response procedures
  • Describe the case lifecycle from New through InProgress, Resolved, and Closed — including resolution status codes
  • Explain how TheHive integrates with MISP for threat intelligence enrichment and Cortex for automated observable analysis
  • Use case metrics and SLA tracking to measure response effectiveness
  • Connect case management concepts to the hands-on TheHive lab in Lab 13.2

Why Case Management Matters

In Lesson 13.1, you learned the IR lifecycle — Preparation through Post-Incident Activity. But a lifecycle on paper does not track itself. When three analysts are working the same P2 incident across a 12-hour shift rotation, someone needs to answer fundamental questions: What has been done? What still needs to happen? Who is responsible for each task? What evidence has been collected? When did we notify stakeholders?

Email threads do not scale. Slack channels lose context. Spreadsheets create version conflicts. Sticky notes on monitors are not an audit trail.

Case management is the operational backbone that turns an IR framework into a trackable, repeatable, auditable process. A case management platform gives your IR team:

CapabilityWithout Case ManagementWith Case Management
Incident tracking"Check the shared doc" — which version?Single source of truth with real-time updates
Task assignment"Someone should look at the firewall logs"Named analyst, due date, status tracking
Evidence collectionScattered across email, Slack, file sharesObservables linked directly to the case
Shift handoff30-minute verbal briefing, details lostWritten case timeline, task status, next steps
Audit trailReconstructed from memory after the factAutomatic logging of every action and timestamp
Metrics"That incident took... a while?"Time to detect, time to contain, resolution time
ComplianceHope the regulator does not ask for detailsComplete case file exportable for legal/regulatory review

Case management is not just for large SOCs. Even a two-person team benefits from structured case tracking. The discipline of creating a case, logging observables, and documenting actions forces methodical investigation rather than context-switching between half-finished analyses. If you have ever lost track of what you were doing during an incident because a new alert distracted you, case management solves that problem.

TheHive Platform Overview

TheHive is an open-source, scalable Security Incident Response Platform (SIRP) designed specifically for SOC teams. It is not a general-purpose ticketing system like Jira or ServiceNow — it is purpose-built for security incidents with native support for observables, threat intelligence integration, automated analysis, and multi-analyst collaboration.

TheHive's architecture consists of three tightly integrated components:

  • TheHive (core platform): Case management, task tracking, observable management, case templates, dashboards, and API
  • Cortex (analysis engine): Automated analysis of observables using "analyzers" — plugins that query VirusTotal, AbuseIPDB, MISP, Shodan, PassiveTotal, and dozens of other services. When you add an IP address to a case, Cortex can automatically check it against 30+ threat intelligence sources.
  • MISP (threat intelligence): Bidirectional integration — TheHive can query MISP for matching IOCs, and findings from TheHive cases can be exported back to MISP as events to share with the community.

TheHive case workflow — from alert ingestion through case creation, observable analysis with Cortex, and MISP enrichment

How TheHive Fits in the CyberBlueSOC Stack

In the full CyberBlueSOC environment, TheHive sits at the center of the response workflow:

  1. Wazuh/Suricata/EveBox detect suspicious activity and generate alerts
  2. Shuffle (SOAR) automatically forwards qualifying alerts to TheHive as new alerts
  3. An analyst reviews the TheHive alert and promotes it to a case (or merges it with an existing case)
  4. The analyst adds observables (IPs, hashes, domains) to the case
  5. Cortex automatically analyzes each observable against configured analyzers
  6. MISP provides additional context — is this IP in a known campaign? Is this hash in a threat feed?
  7. The analyst documents findings, assigns tasks, and tracks the case through resolution

In Lab 13.2, you will work with TheHive directly — creating cases, adding observables, running Cortex analyzers, and managing the case lifecycle.

Creating and Managing Cases

A case in TheHive represents a single security incident or investigation. Every case has structured metadata that drives visibility, prioritization, and handling.

Case Fields

FieldPurposeValues
TitleBrief description of the incident"Ransomware — WIN-SERVER-01" or "Phishing campaign targeting finance"
SeverityImpact level (maps to your P1–P4 from Lesson 13.1)1 (Low), 2 (Medium), 3 (High), 4 (Critical)
TLPTraffic Light Protocol — controls information sharingTLP:RED (named recipients only), TLP:AMBER (org + need-to-know), TLP:GREEN (community), TLP:WHITE (public)
PAPPermissible Actions Protocol — controls what you can do with observablesPAP:RED (no active action), PAP:AMBER (passive analysis only), PAP:GREEN (active queries allowed)
TagsFree-form labels for categorizationransomware, phishing, apt, insider-threat, data-breach
AssigneePrimary analyst responsibleSelected from TheHive user accounts
DescriptionDetailed incident summary in MarkdownInitial assessment, detection source, affected systems
Start dateWhen the incident was detectedTimestamp (auto-populated or manual)

TLP and PAP are not optional metadata — they have real operational consequences. TLP:RED means the information can only be shared with named recipients. If an analyst marks a case TLP:RED and another analyst shares IOCs from that case on a public mailing list, that is a policy violation with potential legal implications. Always verify TLP/PAP before sharing any case data externally. In Lab 13.2, you will practice setting these correctly.

Creating a Case from an Alert

TheHive distinguishes between alerts and cases. Alerts are incoming notifications from integrated tools (Wazuh, Suricata via Shuffle). Cases are confirmed incidents that require investigation.

The workflow:

  1. Alert arrives in TheHive (automatically via Shuffle, or manually imported)
  2. Analyst reviews the alert — checks source, severity, observables, context
  3. Decision point:
    • Promote to new case: This is a new incident requiring investigation
    • Merge into existing case: This alert is related to an incident already being tracked
    • Mark as false positive: Dismiss the alert with a documented reason
    • Ignore: No action needed (use sparingly — document why)

Creating a Case Manually

Not every case starts from an automated alert. Manual case creation covers:

  • Incidents reported by users ("I clicked a suspicious link")
  • Findings from threat hunts (Module 6 skills)
  • External notifications ("Law enforcement called — your data is on a forum")
  • Proactive investigations triggered by threat intelligence

In TheHive's UI: New Case → fill in title, severity, TLP, PAP, tags, description → Create. The case receives a unique identifier (e.g., #42) and appears on the dashboard.

Observables: The Evidence Trail

Observables are the technical indicators linked to a case — the artifacts you discover during investigation and the IOCs you correlate against threat intelligence. If you completed Module 5 (Threat Intelligence), you already understand IOC types. In TheHive, these become observables attached to a case.

Observable Data Types

Data TypeExamplesCommon Sources
ip198.51.100.47, 10.0.0.15Firewall logs, Wazuh alerts, Suricata events
domainevil-c2.example.com, phishing-login.netDNS logs, proxy logs, email headers
hashMD5, SHA-1, SHA-256 of malicious filesEndpoint scans, YARA matches, VirusTotal
mailattacker@phishing.comPhishing analysis, email gateway logs
filenameinvoice.pdf.exe, cmd.phpEndpoint forensics, web server logs
urlhttps://evil.com/payload.exeProxy logs, email link analysis
fqdnc2.attacker.example.comDNS queries, certificate transparency logs
user-agentMozilla/5.0 (compatible; Googlebot/2.1)...Web server logs (fake user agents)
registryHKLM\Software\Microsoft\Windows\CurrentVersion\Run\backdoorWindows endpoint forensics
otherCustom types: mutex names, pipe names, JA3 hashesAdvanced forensic artifacts

Adding Observables to a Case

When you add an observable, TheHive lets you specify:

  • Data type: Select from the list above
  • Value: The actual indicator
  • TLP: Can differ from the case TLP (e.g., a case might be TLP:AMBER but a specific hash from a public threat report is TLP:GREEN)
  • Is IOC: Boolean flag — mark true when this observable is a confirmed indicator of compromise, false when it is still under investigation
  • Tags: Additional categorization (c2, phishing, lateral-movement)
  • Description: Context about where and how you found this observable
💡

Link observables early, verify later. When investigating an alert on Wazuh that shows a suspicious IP, add that IP as an observable to the case immediately — even before you know if it is malicious. Set "Is IOC" to false. Run Cortex analyzers. If the analysis confirms malicious intent, flip it to true. This approach ensures nothing gets lost during fast-moving investigations and creates a complete audit trail of your analytical process.

Tasks: Structured Work Assignment

Tasks break a case into discrete, assignable work items. Instead of "investigate the incident," tasks create accountability:

TaskAssigneeStatusDue
Collect Wazuh logs for linux-web-01 (last 48h)J. KimCompletedFeb 23, 14:00
Run Velociraptor process collection on linux-web-01J. KimCompletedFeb 23, 14:30
Analyze web shell found at /var/www/html/.hidden/A. PatelIn ProgressFeb 23, 16:00
Check MISP for related IOCs (IP: 198.51.100.47)S. RodriguezIn ProgressFeb 23, 15:00
Block C2 IP on perimeter firewallNOC (via Comms Lead)WaitingFeb 23, 15:00
Draft stakeholder update (P2 — 2-hour cadence)M. Chen (IC)WaitingFeb 23, 16:00
Image disk for forensic preservationJ. KimWaitingFeb 23, 17:00

Each task has a task log — a running journal where the assigned analyst documents their work. Task logs are timestamped and become part of the permanent case record. When the next shift analyst picks up the case, they read the task logs to understand exactly what has been done and what remains.

Case Templates

Case templates eliminate the "blank page" problem when creating cases for common incident types. Instead of building task lists from scratch during a crisis, you pre-configure templates during the Preparation phase.

A ransomware case template might include:

Pre-configured fields:

  • Severity: 4 (Critical)
  • TLP: TLP:AMBER
  • PAP: PAP:AMBER
  • Tags: ransomware, malware, encryption

Pre-configured tasks:

  1. Identify patient zero and initial infection vector
  2. Determine scope — how many systems are encrypted?
  3. Isolate affected systems from the network
  4. Collect forensic images before remediation
  5. Identify ransomware variant (check ransom note, encrypted file extensions)
  6. Check for decryption tools (NoMoreRansom.org)
  7. Assess backup availability and integrity
  8. Notify Legal and Cyber Insurance carrier
  9. Determine if data exfiltration occurred (double extortion)
  10. Begin recovery from verified backups
  11. Implement additional monitoring for re-infection
  12. Conduct lessons learned meeting

Build templates for your top 5 incident types during Preparation. Ransomware, phishing compromise, insider threat, DDoS, and data exfiltration cover 80%+ of incidents at most organizations. In Lab 13.2, you will create a case template and then use it to instantiate a case from a simulated alert.

TheHive + Cortex Integration

Cortex is TheHive's analysis engine. When you add an observable to a case, Cortex can automatically run it through dozens of analyzers — saving hours of manual lookups across different threat intelligence platforms.

TheHive and Cortex integration — observables flow from cases to Cortex analyzers, results return as reports attached to the observable

How Cortex Analyzers Work

  1. You add an observable to a case (e.g., IP address 198.51.100.47)
  2. Click Run Analyzers (or configure auto-run for specific data types)
  3. Cortex sends the observable to configured analyzers in parallel:
    • AbuseIPDB: Is this IP reported for abuse?
    • VirusTotal: Has this IP been seen hosting malware?
    • Shodan: What services is this IP running?
    • MISP: Does this IP appear in any MISP events?
    • MaxMind GeoIP: Where is this IP located?
    • Passive DNS: What domains have resolved to this IP?
  4. Each analyzer returns a report with a severity taxonomy: info, safe, suspicious, or malicious
  5. Reports are attached to the observable within the case — visible to all analysts working the case

Common Cortex Analyzers by Observable Type

Observable TypeKey AnalyzersWhat They Tell You
IP addressAbuseIPDB, VirusTotal, Shodan, MaxMind, OTXQueryReputation, hosting info, geolocation, associated malware
DomainVirusTotal, PassiveTotal, DomainTools, URLhausRegistration info, DNS history, known malicious associations
Hash (SHA-256)VirusTotal, HybridAnalysis, MalwareBazaar, MISPDetection ratio, sandbox reports, malware family
URLURLhaus, VirusTotal, PhishTankKnown phishing/malware distribution, redirect chains
EmailEmailrep, HaveIBeenPwnedReputation, breach history, disposable email detection

PAP controls what Cortex can do. If a case is marked PAP:RED (no active action), Cortex analyzers that actively query external services (VirusTotal, Shodan) should not be run — these queries reveal to third parties that you are investigating the observable. PAP:AMBER allows passive lookups (checking cached results). PAP:GREEN allows full active analysis. Configure Cortex analyzer policies to respect PAP settings.

Case Lifecycle

Every case in TheHive follows a defined lifecycle that maps to the NIST framework from Lesson 13.1:

StatusNIST PhaseDescriptionActions
NewDetection & AnalysisCase created, initial assessment pendingAssign analyst, review alert data, set severity/TLP
InProgressContainment/Eradication/RecoveryActive investigation and response underwayAdd observables, run analyzers, assign tasks, document findings
ResolvedPost-Incident Activity beginsResponse actions complete, resolution documentedSet resolution status, write summary, begin lessons learned
ClosedPost-Incident Activity completeCase fully documented, lessons learned capturedFinal review, metrics recorded, case archived

Resolution Status Codes

When resolving a case, TheHive requires a resolution status:

ResolutionMeaning
TruePositiveConfirmed security incident — response actions were appropriate
FalsePositiveInvestigation determined this was not a real incident
IndeterminateInsufficient evidence to confirm or deny — monitoring continues
OtherDoes not fit standard categories (document reason)
DuplicatedThis case duplicates another case (link to the original)
💡

Resolution status feeds your metrics. Tracking the ratio of TruePositive to FalsePositive cases over time tells you how well your detection tools are performing. A high FalsePositive rate means your SIEM rules need tuning (Module 8 skills). A high Indeterminate rate means your visibility is insufficient — you cannot confirm or deny because you lack the data.

Case Metrics and SLAs

TheHive tracks timing metrics automatically:

MetricMeasurementTarget (Example)
Time to AcknowledgeCase creation → first analyst assignmentP1: 5 min, P2: 15 min, P3: 1 hour
Time to TriageCase creation → severity confirmed and investigation startedP1: 15 min, P2: 30 min, P3: 4 hours
Time to ContainCase creation → containment actions executedP1: 1 hour, P2: 4 hours, P3: 24 hours
Time to ResolveCase creation → case status set to ResolvedP1: 24 hours, P2: 72 hours, P3: 1 week
Task Completion RateTasks completed on time vs. overdueTarget: > 90% on-time

These metrics serve two purposes: operational (are we meeting our SLAs?) and strategic (are we getting faster over time? do we need more staff? which incident types take longest?).

Key Takeaways

  • Case management is the operational backbone that turns IR frameworks into trackable, repeatable, auditable processes
  • TheHive is a purpose-built Security Incident Response Platform with native support for observables, Cortex analysis, and MISP integration
  • Cases have structured metadata: severity, TLP (sharing controls), PAP (action controls), tags, and assignee
  • Observables are technical indicators (IPs, domains, hashes, emails, filenames) linked to cases — add early, verify through analysis
  • Tasks create accountability by breaking cases into assignable, trackable work items with logs
  • Case templates pre-configure fields and task lists for common incident types, eliminating the blank-page problem during a crisis
  • Cortex automates observable analysis across dozens of services (VirusTotal, AbuseIPDB, Shodan, MISP) — results attach directly to the case
  • PAP settings control what analysis actions are permitted — PAP:RED prohibits active external queries
  • The case lifecycle (New → InProgress → Resolved → Closed) maps directly to NIST phases, with resolution status codes for metrics
  • Case metrics (time to acknowledge, triage, contain, resolve) drive both operational SLA compliance and strategic improvement

What's Next

You now understand the tools and workflows for structured case management. In Lesson 13.3: Containment, Eradication & Recovery, you will dive deep into the most operationally intense phase of the IR lifecycle — the decisions and actions that stop an attacker, remove their presence, and restore normal operations. You will learn containment strategies (network isolation, account disabling, IP blocking), eradication techniques (malware removal, credential resets, backdoor elimination), and recovery procedures (backup restoration, system rebuilding, re-infection monitoring). Then in Lab 13.2, you will put case management into practice by creating cases, adding observables, running Cortex analyzers, and managing the full case lifecycle in TheHive.

Knowledge Check: TheHive & Case Management

10 questions · 70% to pass

1

What is the primary purpose of a case management platform in incident response?

2

In TheHive, what is the difference between an alert and a case?

3

What does TLP:AMBER mean when assigned to a case in TheHive?

4

In Lab 13.2, you add an IP address observable to a case and run Cortex analyzers. Which analyzer would tell you if the IP has been reported for abuse by other organizations?

5

Why should you set an observable's 'Is IOC' flag to false when you first add it to a case?

6

A case is marked PAP:RED. An analyst wants to run a VirusTotal analyzer against a hash found in the case. Should they proceed?

7

What resolution status should you select when closing a case that was determined to be a false positive?

8

In Lab 13.2, you create a case template for ransomware incidents. What is the primary benefit of case templates?

9

TheHive integrates with MISP for threat intelligence enrichment. What does this integration enable?

10

Which case metric measures the time from case creation to the first containment action being executed?

0/10 answered