Prompts Aligned MITRE ATT&CK and NIST IR lifecycle

Below is a complete, reusable SOC AI prompt library that combineed into a single operational framework:

  • ✅ Reusable SOC prompt library

  • ✅ Defender XDR & Microsoft Sentinel–specific prompt packs

  • ✅ Junior analyst AI playbooks

  • ✅ Explicit alignment to MITRE ATT&CK and NIST 800-61 Incident Response Lifecycle

Written to enterprise SOC standards, suitable for Tier 1–3 analysts, threat hunters, and DFIR practitioners, and designed for repeatable, auditable use.


AI-Driven SOC Prompt Library

Aligned to MITRE ATT&CK & NIST IR


1. Master SOC AI Prompt Standard (Use This Everywhere)

This is the base wrapper every analyst should use.

You are a senior SOC / DFIR analyst operating in an enterprise environment.

Environment:
- Platform(s): Microsoft Defender XDR, Microsoft Sentinel
- OS focus: Windows enterprise (servers, endpoints, Entra ID)
- Logging: MDE, Entra ID, M365, Azure Activity, Security Events

Investigation Phase:
- NIST IR Phase: [Preparation | Detection & Analysis | Containment | Eradication | Recovery | Lessons Learned]

Objective:
- [Triage | Investigation | Threat Hunt | Detection Engineering | Incident Response]

Data Provided:
- [Alerts, logs, KQL output, timelines]

Requirements:
- Map findings to MITRE ATT&CK (Tactic  Technique)
- Base conclusions on evidence only
- Highlight assumptions and confidence level
- Recommend next investigative actions

Output Format:
1. Summary of Findings
2. MITRE ATT&CK Mapping
3. Evidence Observed
4. Risk Assessment
5. Recommended Actions
6. Follow-up Queries

2. Defender XDR Prompt Pack

2.1 Alert Triage (Tier 1)

NIST Phase: Detection & Analysis MITRE: Initial Access / Execution


2.2 Advanced Hunting (Tier 2)

NIST Phase: Detection & Analysis MITRE: Execution, Persistence, Credential Access


2.3 Device Compromise Investigation (Tier 2–3)

NIST Phase: Detection & Analysis MITRE: Lateral Movement, Persistence


3. Microsoft Sentinel Prompt Pack

3.1 Incident Correlation

NIST Phase: Detection & Analysis MITRE: Multi-stage attack chains


3.2 KQL Detection Engineering

NIST Phase: Preparation MITRE: Technique-level detections


3.3 Threat Hunting in Sentinel

NIST Phase: Detection & Analysis MITRE: Discovery, Lateral Movement


4. Junior Analyst AI Playbooks

4.1 Tier-1 Alert Handling Playbook

Trigger: New alert Goal: Decide close vs escalate


4.2 “What Should I Check Next?” Playbook

Goal: Teach investigative thinking


4.3 False Positive Validation Playbook


5. DFIR Prompt Pack (Tier 3 / IR)

5.1 Host-Based Forensics

NIST Phase: Containment & Eradication MITRE: Persistence, Defence Evasion


5.2 Credential Compromise Investigation

MITRE: Credential Access (TA0006)


6. MITRE ATT&CK–Aligned Prompt Examples

Technique-Specific Prompt (T1059 – Command & Scripting)


Tactic-Driven Prompt (Lateral Movement)


7. NIST IR Lifecycle Mapping (Quick Reference)

NIST Phase
AI Usage

Preparation

Detection engineering, playbooks, tuning

Detection & Analysis

Alert triage, hunting, investigation

Containment

Impact analysis, response guidance

Eradication

Root cause validation

Recovery

Monitoring recommendations

Lessons Learned

Control improvements, reporting


8. Operational Guidance

Use AI to:

  • Accelerate analysis

  • Improve consistency

  • Train junior analysts

  • Standardise investigations

Do not use AI to:

  • Replace evidence validation

  • Make legal determinations

  • Execute destructive actions

Last updated