Notebook @ Commands Reference
Notebook @ Commands Reference
This reference covers all available @ commands for investigation notebooks, including syntax, examples, and AI-powered features.
Command Categories
Search & Analysis Commands
@search
Purpose: AI generates search queries from natural language descriptions
Syntax: @search <natural language description>
Examples:
@search find all failed logins in the last hour
@search show network connections from suspicious IP 192.168.1.100
@search lateral movement activity involving domain admin accounts
@search data exfiltration attempts over 100MB
@search powershell execution with encoded commandsAI Output:
- Generated nPL query
- Natural language explanation
- Reasoning steps taken
- Fields used in the query
- Execution ready for immediate use
@pivot
Purpose: AI suggests related queries based on investigation context
Syntax: @pivot (no arguments)
AI Analysis:
- Reviews recent notebook entries
- Identifies investigation patterns
- Suggests 2-4 follow-up queries
- Provides rationale for each suggestion
Example Output:
Context: Investigating failed login attempts from 192.168.1.100
Suggested Pivots:
1. "Check for successful logins from same IP"
→ src_ip="192.168.1.100" AND event_type="login" AND result="success"
2. "Look for other IPs from same subnet"
→ src_ip="192.168.1.*" | stats count by src_ip
3. "Find user accounts targeted by this IP"
→ src_ip="192.168.1.100" | stats count by target_user@summarize
Purpose: Generate comprehensive AI summary of investigation
Syntax: @summarize (no arguments)
AI Summary Includes:
- Investigation overview (2-3 sentences)
- Key findings (3-5 bullet points)
- Entities investigated (IPs, users, hosts, hashes)
- Activity statistics (queries run, alerts reviewed)
- Suggested next steps
- Recommended disposition
Entity Reference Commands
@entity
Purpose: Reference any entity type with explicit typing
Syntax: @entity <type>:<value>
Supported Types:
ip- IP addresses (IPv4/IPv6)user- Usernames, account nameshost- Hostnames, computer nameshash- File hashes (MD5, SHA1, SHA256)email- Email addressesdomain- Domain namesurl- Full URLsfile- File pathsprocess- Process names
Examples:
@entity ip:192.168.1.100
@entity user:john.doe
@entity host:workstation-01
@entity hash:a1b2c3d4e5f67890abcdef1234567890
@entity email:suspicious@malicious.com
@entity domain:evil.com
@entity url:https://malicious.com/payload.exe
@entity file:/tmp/suspicious.exe
@entity process:powershell.exeEntity Shortcuts
Purpose: Quick entity references without explicit typing
Syntax: @<type>:<value>
Available Shortcuts:
@ip:192.168.1.100 # IP address
@user:john.doe # User account
@host:workstation-01 # Hostname
@hash:a1b2c3d4e5f6... # File hash
@email:user@company.com # Email address
@domain:malicious.com # Domain name
@url:https://evil.com # URL
@file:/tmp/malware.exe # File path
@process:powershell.exe # Process nameAuto-Detection: If you use @ioc <value>, the system automatically detects entity type:
192.168.1.1→ IPuser@domain.com→ Emailmalicious.com→ Domaina1b2c3d4e5f6...→ Hash (by length)/path/to/file→ Fileprocess.exe→ Process
Threat Intelligence Commands
@ioc
Purpose: Mark entities as Indicators of Compromise
Syntax: @ioc <value>
Features:
- Automatic entity type detection
- Analyst confidence level (analyst_confirmed)
- Visual IOC markers in timeline
- Integration with threat intel feeds
Examples:
@ioc 192.168.1.100 # Malicious IP
@ioc malicious.com # C2 domain
@ioc user@phishing.com # Phishing email
@ioc a1b2c3d4e5f67890... # Malware hashIOC Display:
[IOC] Indicator of Compromise
IP: 192.168.1.100
Confidence: Analyst Confirmed@timeline
Purpose: Add timeline markers for key investigation events
Syntax: @timeline <event description>
Use Cases:
- Mark when attacks occurred
- Note investigation milestones
- Document decision points
- Highlight critical findings
Examples:
@timeline Initial compromise detected via phishing email
@timeline Lateral movement to domain controller observed
@timeline Malware payload downloaded from C2 server
@timeline Incident response team notified
@timeline Systems isolated and forensic imaging startedTimeline Display:
2024-01-03 14:23:45
Initial compromise detected via phishing emailLinking Commands
@alert
Purpose: Link specific alerts to the investigation
Syntax: @alert (opens searchable dropdown)
Features:
- Search alerts by rule name
- Filter by severity, status, assignment
- Show "My Alerts" toggle
- Full alert context capture
Captured Information:
- Alert ID and rule name
- Severity and current status
- Rule query and matched events
- Risk score and sample events
- Creation timestamp
Auto-Pivot: Linking an alert automatically triggers AI to suggest related queries based on the alert's context.
@detection
Purpose: Link detection rules to the investigation
Syntax: @detection (opens searchable dropdown)
Features:
- Search rules by name
- Filter by severity and mode
- Show rule status (enabled/disabled)
- Capture rule configuration
Captured Information:
- Rule ID and name
- Severity and detection mode
- Complete rule query
- Rule configuration details
AI Integration
All @ commands integrate with the AI system:
Context Awareness
- AI learns from your @ command usage
- Builds investigation context over time
- Improves suggestions based on patterns
- Remembers entity relationships
Auto-Suggestions
Commands that trigger automatic AI analysis:
- @alert → Generates pivot queries based on alert context
- @search → Provides query explanation and field analysis
- @pivot → Analyzes recent context for suggestions
- @summarize → Reviews entire investigation timeline
Smart Linking
- Entities referenced via @ commands become searchable
- Click any entity to generate contextual searches
- AI suggests related entities based on investigation flow
- Automatic IOC correlation across investigations
Command Syntax Rules
General Format
@<command> [arguments]Argument Types
- No arguments:
@pivot,@summarize - Required text:
@search <description>,@timeline <event> - Structured data:
@entity <type>:<value>,@ip:<address> - Interactive selection:
@alert,@detection
Special Characters
- Colon (
:) - Separates entity type from value - Spaces - Separate command from arguments
- No quotes needed - Arguments can contain spaces naturally
Auto-Completion
- Type
@to see available commands - Commands show descriptions and examples
- Entity types show in submenu for
@entity - Alert/detection dropdowns show live search results
Integration Examples
Complete Investigation Flow
# Start with natural language search
@search suspicious powershell activity in last 24 hours
# Reference key entities found
@ip:192.168.1.100
@user:compromised.user
@process:powershell.exe
# Mark confirmed threats
@ioc 192.168.1.100
@ioc malicious.com
# Add timeline context
@timeline Initial access via spear phishing email
@timeline Powershell payload execution detected
# Link related alerts
@alert [Select: "Suspicious PowerShell Execution"]
# Get AI suggestions for next steps
@pivot
# Generate final summary
@summarizeCollaborative Investigation
# Analyst 1 starts investigation
@search failed login attempts from external IPs
@ip:203.0.113.100
@timeline Brute force attack detected
# Analyst 2 adds context
@user:targeted.account
@timeline Account lockout triggered after 10 failed attempts
# Team lead reviews and summarizes
@summarizeBest Practices
Command Usage
- Start broad, get specific - Use
@searchfor initial queries, then@pivotfor focused analysis - Mark threats immediately - Use
@iocas soon as you confirm malicious indicators - Document timeline - Use
@timelinefor key events, not every action - Link related items - Use
@alertand@detectionto build investigation context
AI Optimization
- Be descriptive with @search - "Find lateral movement using WMI" vs "show WMI events"
- Use @pivot regularly - AI learns your investigation patterns
- Provide context in @timeline - Help AI understand investigation flow
- Review AI suggestions - Generated queries may need refinement for your environment
Collaboration
- Use consistent entity formats - Helps team members find related work
- Add timeline context - Other analysts can follow your reasoning
- Link shared alerts - Creates bidirectional references
- Generate summaries - Share findings with
@summarizebefore handoffs
@ Commands provide structured ways to enhance your investigations with AI assistance while maintaining detailed audit trails of your analysis workflow.