Agent SkillsAgent Skills
OTRF

hunt-data-source-identification

@OTRF/hunt-data-source-identification
OTRF
4,519
848 forks
Updated 3/31/2026
View on GitHub

Identify relevant security data sources that could capture the behavior defined in a structured hunt hypothesis. Use this skill after the hunt focus has been defined to translate investigative intent into candidate telemetry sources using existing platform catalogs. This skill supports hunt planning by reasoning over available schemas and metadata before analytics development or query execution.

Installation

$npx agent-skills-cli install @OTRF/hunt-data-source-identification
Claude Code
Cursor
Copilot
Codex
Antigravity

Details

Path.github/skills/hunt-data-source-identification/SKILL.md
Branchmain
Scoped Name@OTRF/hunt-data-source-identification

Usage

After installing, this skill will be available to your AI coding assistant.

Verify installation:

npx agent-skills-cli list

Skill Instructions


name: hunt-data-source-identification description: Identify relevant security data sources that could capture the behavior defined in a structured hunt hypothesis. Use this skill after the hunt focus has been defined to translate investigative intent into candidate telemetry sources using existing platform catalogs. This skill supports hunt planning by reasoning over available schemas and metadata before analytics development or query execution. metadata: short-description: Identify relevant data sources for hunt planning

Identify Relevant Data Sources

This skill translates a structured hunt hypothesis into a set of candidate data sources that could realistically capture the behavior being investigated.

It is executed after the hunt focus has been defined and before analytics are written or queries are executed.

Workflow

  • You MUST complete each step in order and MUST NOT proceed until the current step is complete.
  • You MUST NOT read reference documents unless the current step explicitly instructs you to do so.
  • You MUST NOT write queries or perform data analysis in this skill.
  • Do NOT introduce new research about system internals or adversary tradecraft.

Step 1: Interpret the Hunt Focus

Understand the investigative intent defined by the hunt hypothesis.

  • Review the structured hunt hypothesis.
  • Identify:
    • The attack behavior being investigated
    • The platform context (e.g., Windows, Cloud)
    • The type of activity that must be observable (e.g., configuration changes, execution, authentication)
  • Do NOT infer specific data tables yet.

This step is complete when the expected observable activity is clearly understood at a conceptual level. Do NOT read reference documents during this step.

Step 2: Discover Candidate Data Sources

Identify data sources that could capture the expected activity.

  • Use MS Sentinel.search_tables to perform a semantic search over the telemetry catalog.
  • Search using:
    • The hunt hypothesis
    • Descriptions of the expected behavior
    • Relevant platform or activity keywords
  • Do NOT search for data sources using specific table names.
  • Review returned table descriptions and schemas to assess relevance.

This step reasons over schemas and metadata available in the data lake catalog and does not assert that data is currently flowing, complete, or retained.

Do NOT write queries or validate detections in this step. Do NOT read reference documents during this step.

Step 3: Refine and Validate Relevance

Narrow the list of candidate data sources.

  • Select tables that:
    • Are plausibly able to capture the expected behavior
    • Expose schema elements aligned with the observable activity
  • Explicitly note:
    • Conceptual coverage limitations based on available schemas
    • Planning-level assumptions inferred from table names, descriptions, and schema semantics
  • Surface gaps where expected categories of telemetry do not appear to be represented.

Step 4: Produce Data Source Summary

Produce a final summary using the following documents within this step ONLY.

  • Structure the output using references/data-source-summary-template.md.
  • Do NOT include queries, filters, validation steps, or execution logic.

More by OTRF

View all
hunt-analytics-generation
4,519

Generate query-agnostic analytics that model adversary behavior by translating hunt investigative intent into analytic definitions grounded in schema semantics. This skill is used to define how behavior should manifest in data before query execution or validation, and works best when informed by system internals, adversary tradecraft, a structured hunt focus, and suggested data sources.

hunt-blueprint-generation
4,519

Assemble a complete hunt blueprint by consolidating outputs from prior hunt planning skills into a single, structured plan for execution. Use this skill after system and tradecraft research, hunt focus definition, data source identification, and analytics generation have been completed. This skill is synthesis and packaging only and must not introduce new research, assumptions, or analytics.

hunt-focus-definition
4,519

Define a focused hunt hypothesis by synthesizing completed system internals and adversary tradecraft research. Use this skill after research has been completed to narrow a high-level hunt topic into a single, concrete attack pattern with clear investigative intent. This skill produces a structured, testable hypothesis and should be used before selecting data sources, defining environment scope, or developing analytics.

hunt-research-system-and-tradecraft
4,519

Research system internals and adversary tradecraft to ground a threat hunt in real system behavior and realistic abuse patterns. Use this skill at the start of hunt planning, when you are given a high-level hunt topic but lack a clear understanding of how the system normally operates or how adversaries are known to abuse it. This skill informs early hunt direction by producing candidate abuse patterns, key assumptions, and cited sources, and should be used before defining a concrete hunt hypothesis or selecting data sources.