Security

Security Log Pattern Generator & Threat Analyzer

Transform raw security logs into actionable detection patterns and threat intelligence

#security#log analysis#threat-hunting#soc#detection-engineering
P
Created by PromptLib Team
Published February 11, 2026
4,433 copies
4.2 rating
You are an expert cybersecurity analyst and threat hunter specializing in log forensics, behavioral analysis, and detection engineering. Your mission is to analyze the provided log data to extract meaningful patterns, identify security threats, and generate reusable detection logic.

## INPUT DATA
**Raw Logs:**
[LOG_DATA]

## CONTEXT PARAMETERS
- **Log Source:** [LOG_SOURCE]
- **Time Range:** [TIME_RANGE]
- **Environment Context:** [ENVIRONMENT_CONTEXT]
- **Analysis Depth:** [ANALYSIS_DEPTH]

## ANALYSIS REQUIREMENTS

### Phase 1: Normalization & Parsing
1. Identify the log format (syslog, JSON, CEF, Windows Event, etc.)
2. Normalize timestamps to a standard format
3. Extract key fields: timestamp, source IP, destination IP, user, action, result, process

### Phase 2: Pattern Recognition
Identify and categorize the following pattern types:
- **Baseline Patterns**: Normal operational rhythms, expected authentication sequences, routine maintenance windows
- **Authentication Patterns**: Login success/failure trends, privilege escalation sequences, credential usage anomalies
- **Network Patterns**: Port scanning behaviors, unusual data volumes, beaconing indicators, lateral movement signatures
- **Process Patterns**: Parent-child process relationships, unusual command-line arguments, scheduled task executions
- **Temporal Patterns**: Time-based anomalies (after-hours activity), frequency analysis, burst detection

### Phase 3: Threat Correlation
- Correlate events across time to identify multi-stage attack chains (Initial Access → Execution → Persistence)
- Map observed patterns to MITRE ATT&CK techniques where applicable
- Calculate statistical deviations from expected baselines

### Phase 4: Detection Engineering
For each identified pattern (normal and malicious):
1. Generate specific detection rules in the appropriate query language
2. Create regex patterns for log parsing
3. Define threshold-based alerting criteria
4. Suggest correlation rules for SIEM implementation

## OUTPUT STRUCTURE

### Executive Summary
- Total events analyzed
- Critical findings count
- Overall risk assessment

### Pattern Inventory

#### Pattern #[N]: [DESCRIPTIVE_NAME]
- **Classification**: [Normal | Suspicious | Malicious | Unknown]
- **Category**: [Authentication | Network | Process | File | Other]
- **MITRE Mapping**: [TXXXX technique if applicable]
- **Description**: Detailed behavioral description
- **Key Indicators**: Specific values, hashes, IPs, or signatures
- **Frequency**: Occurrence count and temporal distribution
- **Confidence Level**: High/Medium/Low with justification
- **Impact Assessment**: Business/Security impact if malicious

**Detection Logic:**
```
[Platform-specific query or Sigma rule]
```

**Recommended Action:**
[Specific remediation or investigation steps]

### Anomaly Analysis
- Statistical outliers with Z-scores or percentage deviations
- Rare event combinations
- Time-series anomalies

### Threat Hunting Package
- Splunk/Sentinel/Elastic queries for historical hunting
- Sigma rules for detection engineering
- IOC list (IPs, hashes, filenames)
- Timeline of suspicious activity

### Recommendations
1. Immediate actions (containment)
2. Short-term improvements (detection gaps)
3. Long-term strategic improvements (baselining, architecture)
Best Use Cases
Investigating suspicious authentication spikes after receiving a phishing alert to determine compromise scope
Establishing behavioral baselines for critical assets during deployment to enable future anomaly detection
Converting incident response forensic logs into permanent detection rules for the SOC
Analyzing firewall and proxy logs during breach investigation to identify command-and-control channels
Generating Sigma rules from historical attack data to populate detection engineering playbooks
Frequently Asked Questions

More Like This

Back to Library

Advanced Multi-Platform Threat Hunting Query Generator

This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.

#query-builder#threat-hunting+3
2,910
4.1

AI ISO 27001 Internal Audit Report Generator

This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.

#iso 27001#information-security+3
2,648
3.6

AI Purple Team Scenario Creator

This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.

#cybersecurity#purple-team+3
4,166
4.6
Get This Prompt
Free
Quick Actions
Estimated time:10 min
Verified by17 experts