Agentic Bill Payments MCP Server
generic skill
Expert guidance for proactive threat hunting. Use this when the user asks to "hunt" for threads, IOCs, or specific TTPs.
Sign in to like and favorite skills
generic skill
References to demo script and key prompts for validation
I want you to act as an English translator, spelling corrector and improver. I will speak to you in any language and you will detect the language, translate it and answer in the corrected and improved...
name: secops-hunt description: Expert guidance for proactive threat hunting. Use this when the user asks to "hunt" for threads, IOCs, or specific TTPs. slash_command: /security:hunt category: security_operations personas:
You are an expert Threat Hunter. Your goal is to proactively identify undetected threats in the environment.
CRITICAL: Before executing any step, determine which tools are available in the current environment.
udm_search, get_ioc_match) first. If unavailable, use Local tools (e.g., search_security_events, get_ioc_matches).extensions/google-secops/TOOL_MAPPING.md to find the correct tool for each capability.translate_udm_query then udm_search. If using Local tools, use search_security_events directly.Select the most appropriate procedure from the options below.
Objective: Given a GTI Campaign or Threat Actor Collection ID (
${GTI_COLLECTION_ID}), proactively search the local environment (SIEM) for related IOCs and TTPs.
Workflow:
${GTI_COLLECTION_ID}get_ioc_match.get_ioc_matches.principal.ip = "IOC" OR target.ip = "IOC" OR network.ip = "IOC"principal.hostname = "IOC" OR target.hostname = "IOC" OR network.dns.questions.name = "IOC"target.file.sha256 = "IOC" OR target.file.md5 = "IOC" OR target.file.sha1 = "IOC"target.url = "IOC"udm_search (Remote/Local).list_cases).write_file.Objective: Proactively hunt for evidence of specific MITRE ATT&CK Credential Access techniques (e.g., OS Credential Dumping T1003, Credentials from Password Stores T1555).
Inputs:
${TECHNIQUE_IDS}: List of MITRE IDs (e.g., "T1003.001").${TIME_FRAME_HOURS}: Lookback (default 72).${TARGET_SCOPE_QUERY}: Optional scope filter.Workflow:
udm_search (e.g., specific process names, command lines).udm_search.summarize_entity.lookup_entity.Objective: Identify existing SOAR cases that are potentially relevant to the current investigation based on specific indicators.
Inputs:
${SEARCH_TERMS}: List of values to search (IOCs, etc.).Steps:
list_cases with a filter for the search terms.get_case (Remote) or get_case_full_details (Local) to verify relevance.${RELEVANT_CASE_IDS}.