KS
Killer-Skills

correlate-ioc — how to use correlate-ioc how to use correlate-ioc, correlate-ioc setup guide, SIEM alert correlation, Indicators of Compromise (IOCs) analysis, correlate-ioc vs other security tools, install correlate-ioc, what is correlate-ioc, correlate-ioc tutorial, correlate-ioc best practices

v1.0.0
GitHub

About this Skill

Perfect for Security Analysis Agents needing advanced threat detection and IOC correlation capabilities. correlate-ioc is a skill that correlates SIEM alerts with Indicators of Compromise (IOCs) to identify potential security threats

Features

Searches for alerts containing any IOC in the list using SIEM alert data
Supports optional lookback period for SIEM alerts via TIME_FRAME_HOURS parameter
Allows additional filtering for SOAR cases using SOAR_CASE_FILTER parameter
Correlates IOCs such as IP addresses (e.g., 198.51.100.10) and domains (e.g., evil-domain.com)

# Core Topics

dandye dandye
[0]
[0]
Updated: 3/7/2026

Quality Score

Top 5%
51
Excellent
Based on code quality & docs
Installation
SYS Universal Install (Auto-Detect)
Cursor IDE Windsurf IDE VS Code IDE
> npx killer-skills add dandye/ai-runbooks/correlate-ioc

Agent Capability Analysis

The correlate-ioc MCP Server by dandye is an open-source Categories.community integration for Claude and other AI agents, enabling seamless task automation and capability expansion. Optimized for how to use correlate-ioc, correlate-ioc setup guide, SIEM alert correlation.

Ideal Agent Persona

Perfect for Security Analysis Agents needing advanced threat detection and IOC correlation capabilities.

Core Value

Empowers agents to correlate SIEM alerts with Indicators of Compromise (IOCs) such as IP addresses and domains, utilizing SOAR case filtering and customizable time frame analysis through parameters like TIME_FRAME_HOURS and SOAR_CASE_FILTER.

Capabilities Granted for correlate-ioc MCP Server

Correlating IOCs with existing SIEM alerts
Automating threat detection workflows
Enhancing incident response with IOC-based alert filtering

! Prerequisites & Limits

  • Requires access to SIEM alerts and cases
  • Dependent on quality and completeness of IOC lists
Project
SKILL.md
2.0 KB
.cursorrules
1.2 KB
package.json
240 B
Ready
UTF-8

# Tags

[No tags]
SKILL.md
Readonly

Correlate IOC Skill

Check for existing SIEM alerts and cases related to specific Indicators of Compromise.

Inputs

  • IOC_LIST - Single IOC or list of IOCs (e.g., ["198.51.100.10", "evil-domain.com"])
  • (Optional) TIME_FRAME_HOURS - Lookback period for SIEM alerts (default: 168 = 7 days)
  • (Optional) SOAR_CASE_FILTER - Additional filter for SOAR cases (e.g., status="OPEN")

Workflow

Step 1: Correlate SIEM Alerts

Search for alerts containing any IOC in the list:

secops-mcp.get_security_alerts(
    query=IOC_based_query,
    hours_back=TIME_FRAME_HOURS
)

Store summary in RELATED_SIEM_ALERTS:

  • Alert count
  • Alert types/names
  • Severity distribution
  • Affected assets

Step 2: Correlate Cases

Search for cases containing any IOC:

secops-soar.list_cases(
    filter=IOC_based_filter + SOAR_CASE_FILTER
)

Store summary in RELATED_SOAR_CASES:

  • Case IDs and names
  • Case status
  • Case priority

Required Outputs

After completing this skill, you MUST report these outputs:

OutputDescription
RELATED_SIEM_ALERTSSummary of SIEM alerts related to the IOC(s)
RELATED_CASESSummary of cases related to the IOC(s)
CORRELATION_STATUSSuccess/failure status of the correlation
MALICIOUS_CONFIDENCEDerived confidence based on alert history: high, medium, low, or none

Use Cases

  1. Before Investigation - Check if IOC is already under investigation
  2. During Enrichment - Understand internal activity for an IOC
  3. Threat Hunt - Find all alerts/cases related to campaign indicators
  4. Incident Response - Identify scope of compromise across cases

Correlation Summary Template

IOC Correlation Summary for [IOC_LIST]:

SIEM Alerts (last [TIME_FRAME_HOURS] hours):
- Total alerts: [count]
- Alert types: [list]
- Affected hosts: [list]

Related Cases:
- Open cases: [count] - [IDs]
- Closed cases: [count]
- Related investigations: [summary]

Related Skills

Looking for an alternative to correlate-ioc or building a Categories.community AI Agent? Explore these related open-source MCP Servers.

View All

widget-generator

Logo of f
f

widget-generator is an open-source AI agent skill for creating widget plugins that are injected into prompt feeds on prompts.chat. It supports two rendering modes: standard prompt widgets using default PromptCard styling and custom render widgets built as full React components.

149.6k
0
Design

chat-sdk

Logo of lobehub
lobehub

chat-sdk is a unified TypeScript SDK for building chat bots across multiple platforms, providing a single interface for deploying bot logic.

73.0k
0
Communication

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
Communication

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
Communication