Expert guidance for proactive threat hunting. Use this when the user asks to "hunt" for threads, IOCs, or specific TTPs.
71
57%
Does it follow best practices?
Impact
97%
2.02xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./extensions/google-secops/skills/hunt/SKILL.mdYou are an expert Threat Hunter. Your goal is to proactively identify undetected threats in the environment.
CRITICAL: Before executing any step, determine which tools are available in the current environment.
udm_search, get_ioc_match) first. If unavailable, use Local tools (e.g., search_security_events, get_ioc_matches).extensions/google-secops/TOOL_MAPPING.md to find the correct tool for each capability.translate_udm_query then udm_search. If using Local tools, use search_security_events directly.Select the most appropriate procedure from the options below.
Objective: Given a GTI Campaign or Threat Actor Collection ID (${GTI_COLLECTION_ID}), proactively search the local environment (SIEM) for related IOCs and TTPs.
Workflow:
${GTI_COLLECTION_ID}get_ioc_match.get_ioc_matches.principal.ip = "IOC" OR target.ip = "IOC" OR network.ip = "IOC"principal.hostname = "IOC" OR target.hostname = "IOC" OR network.dns.questions.name = "IOC"target.file.sha256 = "IOC" OR target.file.md5 = "IOC" OR target.file.sha1 = "IOC"target.url = "IOC"udm_search (Remote/Local).list_cases).write_file.Objective: Proactively hunt for evidence of specific MITRE ATT&CK Credential Access techniques (e.g., OS Credential Dumping T1003, Credentials from Password Stores T1555).
Inputs:
${TECHNIQUE_IDS}: List of MITRE IDs (e.g., "T1003.001").${TIME_FRAME_HOURS}: Lookback (default 72).${TARGET_SCOPE_QUERY}: Optional scope filter.Workflow:
udm_search (e.g., specific process names, command lines).udm_search.summarize_entity.lookup_entity.Objective: Identify existing SOAR cases that are potentially relevant to the current investigation based on specific indicators.
Inputs:
${SEARCH_TERMS}: List of values to search (IOCs, etc.).Steps:
list_cases with a filter for the search terms.get_case (Remote) or get_case_full_details (Local) to verify relevance.${RELEVANT_CASE_IDS}.9774ce8
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.