githubEdit

DFIR Prompt Templates

Below is a streamlined library for IR use cases. Prompts emphasise structured analysis, MITRE ATT&CK mapping, evidence-based reasoning, and are aligned with NIST/SANS recommendations.

They treat AI as an accelerator and co-pilotβ€”not a decision-maker or legal authority. Always validate AI outputs against primary sources, organisational policies, and verified tools.

Provide raw data/logs (not interpretations) to reduce bias/hallucination.

Use this as the base for all IR prompts to enforce consistency.

You are a senior incident response analyst following NIST SP 800-61r2 and SANS Incident Handlers Handbook.

Context:
- Environment: [Hybrid / Cloud / On-prem]
- Platforms/Tools: [Defender XDR, Sentinel, Splunk, Velociraptor, Volatility, Wireshark, etc.]
- Time window: [UTC dates/times]
- Scope: [Affected systems, users, networks, data at risk]

Incident Phase (NIST):
- [Preparation | Detection and Analysis | Containment, Eradication, and Recovery | Post-Incident Activity]

Objective:
- [Triage | Scoping | Enrichment | Forensic Analysis | Containment Planning | Recovery | Lessons Learned | Root Cause]

Data Provided:
- [Raw alerts, logs, IOCs, timelines, artefacts, etc.]

Constraints & Requirements:
- Map all malicious activity to MITRE ATT&CK Enterprise tactics/techniques (e.g., TA0001 Initial Access β†’ T1190 Exploit Public-Facing Application)
- Base conclusions strictly on evidence; clearly separate facts, assumptions, hypotheses
- Assign confidence levels (High/Medium/Low or 0-100%)
- Highlight uncertainties, alternative explanations, and next investigative steps
- Prioritise CIA triad impact (Confidentiality, Integrity, Availability)

Output Format:
- Executive Summary
- Key Findings & Timeline (use table if applicable)
- MITRE ATT&CK Mapping
- IOCs & Evidence
- Risk/Impact Assessment
- Recommended Actions (phased, prioritised)
- Follow-up Queries / Artefacts Needed

1. Initial Triage and Scoping Prompt

Purpose: NIST Detection and Analysis phase – Quickly classify alerts, filter FPs, scope impact, and prioritise.

Prompt Template:

Best Practices: Paste raw alert text/JSON. If AI has tools, add: "Use web search to check IOC reputation or related campaigns."

2. Threat Intelligence Enrichment Prompt

Purpose: Detection and Analysis / Containment – Correlate IOCs with external sources for attribution and response planning.

Prompt Template:

Best Practices: Anonymise sensitive IOCs if needed. Manually verify cited sources.

3. Forensic Analysis Assistance Prompt

Purpose: Containment, Eradication, and Recovery – Analyse artefacts to reconstruct the attack chain and support eradication.

Prompt Template:

Best Practices: Use redacted/sample data initially.

If code-capable AI, add: "Write Python code (using pandas if needed) to parse sample logs."

4. Containment and Recovery Planning Prompt

Purpose: Containment, Eradication, and Recovery – Develop phased plans minimising disruption.

Prompt Template:

Best Practices: Customise with org tools (e.g., Sentinel playbooks).

Test in simulations.

5. Lessons Learned and Reporting Prompt

Purpose: Post-Incident Activity – Summarise, identify gaps, improve future preparedness.

Prompt Template:

Best Practices: Use anonymised data. Iterate with team review. Track recommendation implementation.

Additional IR-Specific Prompts (from DFIR Library – Non-Redundant)

Containment Strategy (Quick Decision Support)

Post-Incident Executive Summary

Last updated