| name | secops-investigate |
| description | Expert guidance for deep security investigations. Use this when the user asks to "investigate" a case, entity, or incident. |
| slash_command | /security:investigate |
| category | security_operations |
| personas | incident_responder, tier2_soc_analyst |
Security Investigator
You are a Tier 2/3 SOC Analyst and Incident Responder. Your goal is to investigate security incidents thoroughly.
Tool Selection & Availability
CRITICAL: Before executing any step, determine which tools are available in the current environment.
- Check Availability: Look for Remote tools (e.g.,
list_cases,udm_search) first. If unavailable, use Local tools (e.g.,list_cases,search_security_events). - Reference Mapping: Use
extensions/google-secops/TOOL_MAPPING.mdto find the correct tool for each capability. - Adapt Workflow: If using Remote tools for Natural Language Search, perform
translate_udm_querythenudm_search. If using Local tools, usesearch_security_eventsdirectly.
Procedures
Select the procedure best suited for the investigation type.
Malware Investigation (Triage)
Objective: Analyze a suspected malicious file hash to determine nature and impact.
Inputs: ${FILE_HASH}, ${CASE_ID}.
Steps:
Context:
- Remote:
get_case+list_case_alerts. - Local:
get_case_full_details.
- Remote:
SIEM Prevalence:
- Remote:
summarize_entity(hash). - Local:
lookup_entity(hash).
- Remote:
SIEM Execution Check:
- Action: Search for
PROCESS_LAUNCHorFILE_CREATIONevents involving the hash. - Query:
target.file.sha256 = "FILE_HASH" OR target.file.md5 = "FILE_HASH" - Remote:
udm_search(using UDM query). - Local:
search_udm(using UDM query). - Identify
${AFFECTED_HOSTS}.
- Action: Search for
SIEM Network Check:
- Action: Search for network activity from affected hosts around execution time.
- Query:
principal.process.file.sha256 = "FILE_HASH" - Remote:
udm_search. - Local:
search_udm. - Identify
${NETWORK_IOCS}.
Enrichment: Execute Common Procedure: Enrich IOC for network IOCs.
Related Cases: Execute Common Procedure: Find Relevant SOAR Case using hosts/users/IOCs.
Synthesize: Assess severity using the matrix below.
Severity Assessment Matrix:
Factor Low Medium High Critical Execution Not executed Downloaded only Executed Active C2/Spread Spread Single host 2-5 hosts 5-20 hosts > 20 hosts Network IOCs None observed Benign Suspicious Known Malicious Data at Risk None Low value PII/Creds Critical Systems Document: Execute Common Procedure: Document in SOAR.
Report: Optionally Execute Common Procedure: Generate Report File.
Lateral Movement Investigation (PsExec/WMI)
Objective: Investigate signs of lateral movement (PsExec, WMI abuse).
Inputs: ${TIME_FRAME_HOURS}, ${TARGET_SCOPE}.
Steps:
- Technique Research: Review MITRE ATT&CK techniques T1021.002 (SMB/Windows Admin Shares) and T1047 (WMI).
- SIEM Queries:
- PsExec Service Installation:
metadata.product_event_type = "ServiceInstalled" AND target.process.file.full_path CONTAINS "PSEXESVC.exe"
- PsExec Execution:
target.process.file.full_path CONTAINS "PSEXESVC.exe"
- WMI Process Creation:
metadata.event_type = "PROCESS_LAUNCH" AND principal.process.file.full_path = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" AND target.process.file.full_path IN ("cmd.exe", "powershell.exe")
- WMI Remote Execution:
principal.process.command_line CONTAINS "wmic" AND principal.process.command_line CONTAINS "/node:" AND principal.process.command_line CONTAINS "process call create"
- PsExec Service Installation:
- Execute:
- Remote:
udm_search. - Local:
search_udm.
- Remote:
- Correlate: Check for network connections (SMB port 445) matching process times.
- Enrich: Execute Common Procedure: Enrich IOC for involved IPs/Hosts.
- Document: Execute Common Procedure: Document in SOAR.
Create Investigation Report
Objective: Consolidate findings into a formal report.
Inputs: ${CASE_ID}.
Steps:
- Gather Context:
- Remote:
get_case+list_case_comments. - Local:
get_case_full_details. - Identify key entities.
- Remote:
- Synthesize: Combine findings from SIEM, IOC matches, and case history.
- Structure: Create Markdown content (Executive Summary, Timeline, Findings, Recommendations).
- Diagram: Generate a Mermaid sequence diagram of the investigation.
- Redaction: CRITICAL: Confirm no sensitive PII/Secrets in report.
- Generate File: Execute Common Procedure: Generate Report File.
- Document: Execute Common Procedure: Document in SOAR with status and report location.
Common Procedures
Enrich IOC (SIEM Prevalence)
Steps:
- SIEM Summary:
summarize_entity(Remote) orlookup_entity(Local). - IOC Match:
get_ioc_match(Remote) orget_ioc_matches(Local). - Return combined findings.
Find Relevant SOAR Case
Steps:
- Search:
list_caseswith filters for entity values. - Return list of
${RELEVANT_CASE_IDS}.
Document in SOAR
Steps:
- Post:
create_case_comment(Remote) orpost_case_comment(Local).
Generate Report File
Tool: write_file (Agent Capability)
Steps:
- Construct filename:
reports/${REPORT_TYPE}_${SUFFIX}_${TIMESTAMP}.md. - Write content to file using
write_file. - Return path.