
How It Works
Threat reports often contain valuable Indicators of Compromise (IOCs) — hashes, IP addresses, domain names — that security teams need to operationalize quickly. But manually copying and converting them into queries for platforms like Microsoft Sentinel is slow, error-prone, and distracting from real response.
Uncoder AI eliminates this bottleneck by automatically extracting IOCs from unstructured text and generating fully formed queries in the detection language of your choice.

In the example shown, indicators parsed from a threat report — including file hashes, domains, and IPs — are instantly converted into a Microsoft Sentinel Kusto Query Language (KQL) search block. Key enhancements include:
- Automated replacement of
hxxp
withhttp
, or obfuscated indicators with valid syntax. - Deduplication, private network filtering, and syntax validation.
- Configurable toggle options to tailor parsing behavior to your workflow.
The final output is platform-ready and can be deployed into detection pipelines or enrichment tools with no manual post-processing required.
Why It’s Innovative
Rather than using static IOC feeds or third-party parsers, Uncoder AI integrates real-time AI-powered IOC processing directly into the rule authoring flow. Built on a privacy-first AI engine, it ensures that threat intelligence becomes actionable detection logic — not just another report in the inbox.
Core benefits:
- Built-in custom field mapping and query formatting
- Hosted securely inside SOC Prime’s private cloud infrastructure
- Seamless support for 20+ detection languages, including Microsoft Sentinel, Splunk, Elastic Stack, Graylog, OpenSearch, CrowdStrike Falcon LogScale, Sigma, and many others
- Recently expanded with 11 additional formats, including STIX, SQLite, and AWS Athena

Operational Value
- Faster IOC Ingestion: Transform threat report artifacts into live queries in seconds.
- Error Reduction: Eliminate manual formatting errors and missed indicators.
- Accessible to All Tiers: Allows Tier 1–2 analysts to build IOC-based detections without deep platform expertise.
- Secure and Private: Data stays within the platform; no external API calls or logging.
From Text to Threat Detection in Seconds
Threat intelligence has value only when acted upon. With Uncoder AI, SOC teams can instantly convert threat report IOCs into structured queries — ready to deploy, filter, correlate, and alert. No copying. No regex. No risk of syntax errors.
With native support for 30+ platforms and built-in AI processing, Uncoder AI transforms threat reports into your first line of defense.
The post From IOCs to Queries: How Uncoder AI Automates Threat Intelligence Action appeared first on SOC Prime.