Skip to main content

CPS, Network, EDR & Specialized Tools

Beyond SIEM and SOAR, AuroraSOC provides 22 additional tools across six domains. This page covers all remaining tool modules.

EDR Tools (2 tools)

Located in aurorasoc/tools/edr/:

IsolateEndpoint

class IsolateEndpoint(AuroraTool):
name = "isolate_endpoint"
description = "Network-isolate a compromised host via EDR platform"
# Parameters: hostname, isolation_type (full/selective), reason
# Returns: isolation status, management channel info

ScanEndpoint

class ScanEndpoint(AuroraTool):
name = "scan_endpoint"
description = "Execute on-demand security scan via EDR"
# Parameters: hostname, scan_type (quick/full/ioc), targets
# Returns: findings, risk_score, recommendations

CPS Tools (6 tools)

Located in aurorasoc/tools/cps/. The largest tool module, reflecting the complexity of CPS security.

QueryCPSSensor

Reads real-time telemetry from CPS devices via the MQTT bridge:

  • Temperature, vibration, voltage readings
  • Network activity counters
  • Device health status
  • Last communication timestamp

VerifyAttestation

Triggers firmware attestation for a specific device:

  • Sends attestation challenge to device via MQTT command topic
  • Device computes firmware hash and ECDSA signature
  • Rust core engine verifies signature
  • Returns attestation result (VERIFIED/FAILED)

RevokeCertificate

Revokes a compromised device's TLS certificate:

  • Contacts the internal CA or Vault PKI backend
  • Adds certificate to CRL (Certificate Revocation List)
  • Device will fail TLS handshake on next connection
  • Irreversible — always requires human approval

CorrelatePhysicalCyber

Analyzes events for physical-cyber correlations:

  • Takes physical event (sensor data) and cyber event (alert)
  • Checks temporal proximity (configurable window)
  • Evaluates location/zone correlation
  • Returns correlation type and confidence

QueryOTProtocol

Queries industrial protocol data:

  • Modbus register reads
  • DNP3 data point queries
  • BACnet property reads
  • OPC UA node browsing

IsolateNetworkSegment

Isolates an OT network segment at the firewall/switch:

  • Blocks all traffic to/from a specified VLAN or subnet
  • Preserves safety-critical communication (configurable whitelist)
  • Requires human approval — could disrupt physical processes

Network Tools (3 tools)

Located in aurorasoc/tools/network/:

ToolPurpose
AnalyzeFlowsAnalyze network flow data (NetFlow/IPFIX) for anomalies
DetectDNSTunnelingDetect DNS tunneling via entropy and query pattern analysis
BlockIPBlock a malicious IP at the network perimeter

DNS Tunneling Detection

Threat Intel Tools (3 tools)

Located in aurorasoc/tools/threat_intel/:

ToolPurpose
LookupIOCSearch local DB and external feeds for an IOC
EnrichIOCAdd context and store in vector DB
ShareIOCPublish IOC to NATS for cross-site sharing

Forensics Tools (2 tools)

Located in aurorasoc/tools/forensics/:

ToolPurpose
CollectEvidenceGather forensic artifacts from an endpoint
TimelineReconstructionBuild chronological event timeline

Malware Tools (2 tools)

Located in aurorasoc/tools/malware/:

ToolPurpose
RunYARAScanExecute YARA rules against files or memory
SandboxAnalysisSubmit files to sandbox for behavioral analysis

UEBA Tools (3 tools)

Located in aurorasoc/tools/ueba/:

ToolPurpose
HuntLOLBinsDetect Living-Off-the-Land binary usage
BaselineDeviationDetect deviations from user/entity behavioral baselines
UserRiskScoreCalculate composite risk score for a user

LOLBin Detection

class HuntLOLBins(AuroraTool):
"""Detect Living-Off-the-Land binaries used for malicious purposes."""

LOLBIN_PATTERNS = [
{"binary": "certutil.exe", "suspicious_args": ["-urlcache", "-decode"]},
{"binary": "mshta.exe", "suspicious_args": ["http://", "javascript:"]},
{"binary": "regsvr32.exe", "suspicious_args": ["/s", "/u", "http://"]},
{"binary": "rundll32.exe", "suspicious_args": ["javascript:", "shell32"]},
{"binary": "bitsadmin.exe", "suspicious_args": ["/transfer"]},
# ... 20+ more patterns
]

MCP Registry (1 tool)

Located in aurorasoc/tools/registry/:

The MCP (Model Context Protocol) registry server exposes all 31 tools as a single MCP-compatible endpoint. AI agents connect to this registry to discover available tools.

Complete Tool Reference

#ToolModuleDomain
1SearchLogssiemLog search
2CorrelateEventssiemEvent correlation
3ExtractIOCsiemIOC extraction
4MitreMapsiemMITRE mapping
5ExecutePlaybooksoarPlaybook execution
6RequestHumanApprovalsoarHuman gate
7CreateCasesoarCase creation
8UpdateCasesoarCase update
9GenerateReportsoarReport generation
10IsolateEndpointedrHost isolation
11ScanEndpointedrEndpoint scan
12QueryCPSSensorcpsSensor telemetry
13VerifyAttestationcpsFirmware integrity
14RevokeCertificatecpsCertificate revocation
15CorrelatePhysicalCybercpsCross-domain correlation
16QueryOTProtocolcpsIndustrial protocol
17IsolateNetworkSegmentcpsOT isolation
18LookupIOCthreat_intelIOC lookup
19EnrichIOCthreat_intelIOC enrichment
20ShareIOCthreat_intelIOC sharing
21AnalyzeFlowsnetworkFlow analysis
22DetectDNSTunnelingnetworkDNS telemetry
23BlockIPnetworkIP blocking
24CollectEvidenceforensicsEvidence collection
25TimelineReconstructionforensicsTimeline building
26RunYARAScanmalwareYARA scanning
27SandboxAnalysismalwareSandbox execution
28HuntLOLBinsuebaLOLBin detection
29BaselineDeviationuebaBehavior analysis
30UserRiskScoreuebaUser risk
31MCP RegistryregistryTool discovery