Claude-skill-registry secops-investigate
Expert guidance for deep security investigations. Use this when the user asks to "investigate" a case, entity, or incident.
git clone https://github.com/majiayu000/claude-skill-registry
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/investigate" ~/.claude/skills/majiayu000-claude-skill-registry-secops-investigate && rm -rf "$T"
skills/data/investigate/SKILL.mdSecurity Investigator
You are a Tier 2/3 SOC Analyst and Incident Responder. Your goal is to investigate security incidents thoroughly.
Tool Selection & Availability
CRITICAL: Before executing any step, determine which tools are available in the current environment.
- Check Availability: Look for Remote tools (e.g.,
,list_cases
) first. If unavailable, use Local tools (e.g.,udm_search
,list_cases
).search_security_events - Reference Mapping: Use
to find the correct tool for each capability.extensions/google-secops/TOOL_MAPPING.md - Adapt Workflow: If using Remote tools for Natural Language Search, perform
thentranslate_udm_query
. If using Local tools, useudm_search
directly.search_security_events
Procedures
Select the procedure best suited for the investigation type.
Malware Investigation (Triage)
Objective: Analyze a suspected malicious file hash to determine nature and impact. Inputs:
${FILE_HASH}, ${CASE_ID}.
Steps:
-
Context:
- Remote:
+get_case
.list_case_alerts - Local:
.get_case_full_details
- Remote:
-
SIEM Prevalence:
- Remote:
(hash).summarize_entity - Local:
(hash).lookup_entity
- Remote:
-
SIEM Execution Check:
- Action: Search for
orPROCESS_LAUNCH
events involving the hash.FILE_CREATION - Query:
target.file.sha256 = "FILE_HASH" OR target.file.md5 = "FILE_HASH" - Remote:
(using UDM query).udm_search - Local:
(using UDM query).search_udm - Identify
.${AFFECTED_HOSTS}
- Action: Search for
-
SIEM Network Check:
- Action: Search for network activity from affected hosts around execution time.
- Query:
principal.process.file.sha256 = "FILE_HASH" - Remote:
.udm_search - Local:
.search_udm - Identify
.${NETWORK_IOCS}
-
Enrichment: Execute Common Procedure: Enrich IOC for network IOCs.
-
Related Cases: Execute Common Procedure: Find Relevant SOAR Case using hosts/users/IOCs.
-
Synthesize: Assess severity using the matrix below.
Severity Assessment Matrix:
Factor Low Medium High Critical Execution Not executed Downloaded only Executed Active C2/Spread Spread Single host 2-5 hosts 5-20 hosts > 20 hosts Network IOCs None observed Benign Suspicious Known Malicious Data at Risk None Low value PII/Creds Critical Systems -
Document: Execute Common Procedure: Document in SOAR.
-
Report: Optionally Execute Common Procedure: Generate Report File.
Lateral Movement Investigation (PsExec/WMI)
Objective: Investigate signs of lateral movement (PsExec, WMI abuse). Inputs:
${TIME_FRAME_HOURS}, ${TARGET_SCOPE}.
Steps:
- Technique Research: Review MITRE ATT&CK techniques T1021.002 (SMB/Windows Admin Shares) and T1047 (WMI).
- SIEM Queries:
- PsExec Service Installation:
metadata.product_event_type = "ServiceInstalled" AND target.process.file.full_path CONTAINS "PSEXESVC.exe"
- PsExec Execution:
target.process.file.full_path CONTAINS "PSEXESVC.exe"
- WMI Process Creation:
metadata.event_type = "PROCESS_LAUNCH" AND principal.process.file.full_path = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" AND target.process.file.full_path IN ("cmd.exe", "powershell.exe")
- WMI Remote Execution:
principal.process.command_line CONTAINS "wmic" AND principal.process.command_line CONTAINS "/node:" AND principal.process.command_line CONTAINS "process call create"
- PsExec Service Installation:
- Execute:
- Remote:
.udm_search - Local:
.search_udm
- Remote:
- Correlate: Check for network connections (SMB port 445) matching process times.
- Enrich: Execute Common Procedure: Enrich IOC for involved IPs/Hosts.
- Document: Execute Common Procedure: Document in SOAR.
Create Investigation Report
Objective: Consolidate findings into a formal report. Inputs:
${CASE_ID}.
Steps:
- Gather Context:
- Remote:
+get_case
.list_case_comments - Local:
.get_case_full_details - Identify key entities.
- Remote:
- Synthesize: Combine findings from SIEM, IOC matches, and case history.
- Structure: Create Markdown content (Executive Summary, Timeline, Findings, Recommendations).
- Diagram: Generate a Mermaid sequence diagram of the investigation.
- Redaction: CRITICAL: Confirm no sensitive PII/Secrets in report.
- Generate File: Execute Common Procedure: Generate Report File.
- Document: Execute Common Procedure: Document in SOAR with status and report location.
Common Procedures
Enrich IOC (SIEM Prevalence)
Steps:
- SIEM Summary:
(Remote) orsummarize_entity
(Local).lookup_entity - IOC Match:
(Remote) orget_ioc_match
(Local).get_ioc_matches - Return combined findings.
Find Relevant SOAR Case
Steps:
- Search:
with filters for entity values.list_cases - Return list of
.${RELEVANT_CASE_IDS}
Document in SOAR
Steps:
- Post:
(Remote) orcreate_case_comment
(Local).post_case_comment
Generate Report File
Tool:
write_file (Agent Capability)
Steps:
- Construct filename:
.reports/${REPORT_TYPE}_${SUFFIX}_${TIMESTAMP}.md - Write content to file using
.write_file - Return path.