Generate query-agnostic analytics that model adversary behavior by translating hunt investigative intent into analytic definitions grounded in schema semantics. This skill is used to define how behavior should manifest in data before query execution or validation, and works best when informed by system internals, adversary tradecraft, a structured hunt focus, and suggested data sources.
Installation
Details
Usage
After installing, this skill will be available to your AI coding assistant.
Verify installation:
npx agent-skills-cli listSkill Instructions
name: hunt-analytics-generation description: Generate query-agnostic analytics that model adversary behavior by translating hunt investigative intent into analytic definitions grounded in schema semantics. This skill is used to define how behavior should manifest in data before query execution or validation, and works best when informed by system internals, adversary tradecraft, a structured hunt focus, and suggested data sources. metadata: short-description: Generate analytics for hunt planning
Generating Analytics
This skill translates hunt investigative intent into a small set of analytics that describe how adversary behavior should manifest in data.
It is executed during hunt planning, after sufficient context has been established, and before queries are executed or detections are validated.
This skill focuses on behavior modeling, not determining what is suspicious or anomalous, which requires broader environmental context beyond adversary descriptions or schema inspection.
Workflow
- You MUST complete each step in order and MUST NOT proceed until the current step is complete.
- You MUST NOT read reference documents unless the current step explicitly instructs you to do so.
- You MUST NOT execute queries or validate results in this skill.
- You MUST NOT introduce new research about system internals or adversary tradecraft.
- You MAY retrieve table schemas using platform tools when explicitly instructed.
Step 1: Interpret and Normalize Input
Establish the context required to generate analytics.
- Use the available inputs, which may include:
- System internals context
- Adversary tradecraft context
- The structured hunt hypothesis
- Suggested or identified data sources
- Confirm the specific adversary behavior to be modeled.
- If critical context is missing, request minimal clarification before proceeding.
This step is complete when the behavior to be modeled is clearly understood. Do NOT read reference documents during this step.
Step 2: Generate Analytic Candidates (repeat up to 5 times)
For each analytic candidate:
- Select the most relevant data source or sources from the available list.
- Use
MS Sentinel.search_tablesto retrieve schema details for the selected tables. - Review schemas to understand available fields and attributes.
- Identify the key entities involved (e.g., process, user, host, registry key, IP).
- Model the behavior as relationships or sequences between entities, using a graph-like view to represent how the activity unfolds and the conditions that matter.
- Ground the logic by mapping entities and conditions to schema fields.
- Capture a query-style representation, using SQL-like logic, that expresses analytic intent without execution.
Do NOT determine whether the behavior is suspicious or anomalous. Do NOT write executable queries. Do NOT read reference documents during this step.
Step 3: Produce Analytics Summary
Produce a final summary of the generated analytics.
- Structure the output using
references/analytic-template.md. - Repeat the template for each analytic.
- Clearly separate:
- Behavioral reasoning
- Schema grounding
- Query-style representation
Do NOT include execution logic, thresholds, or validation steps.
More by OTRF
View allAssemble a complete hunt blueprint by consolidating outputs from prior hunt planning skills into a single, structured plan for execution. Use this skill after system and tradecraft research, hunt focus definition, data source identification, and analytics generation have been completed. This skill is synthesis and packaging only and must not introduce new research, assumptions, or analytics.
Identify relevant security data sources that could capture the behavior defined in a structured hunt hypothesis. Use this skill after the hunt focus has been defined to translate investigative intent into candidate telemetry sources using existing platform catalogs. This skill supports hunt planning by reasoning over available schemas and metadata before analytics development or query execution.
Define a focused hunt hypothesis by synthesizing completed system internals and adversary tradecraft research. Use this skill after research has been completed to narrow a high-level hunt topic into a single, concrete attack pattern with clear investigative intent. This skill produces a structured, testable hypothesis and should be used before selecting data sources, defining environment scope, or developing analytics.
Research system internals and adversary tradecraft to ground a threat hunt in real system behavior and realistic abuse patterns. Use this skill at the start of hunt planning, when you are given a high-level hunt topic but lack a clear understanding of how the system normally operates or how adversaries are known to abuse it. This skill informs early hunt direction by producing candidate abuse patterns, key assumptions, and cited sources, and should be used before defining a concrete hunt hypothesis or selecting data sources.
