Prompts Aligned MITRE ATT&CK and NIST IR lifecycle
Below is a complete, reusable SOC AI prompt library that combineed into a single operational framework:
✅ Reusable SOC prompt library
✅ Defender XDR & Microsoft Sentinel–specific prompt packs
✅ Junior analyst AI playbooks
✅ Explicit alignment to MITRE ATT&CK and NIST 800-61 Incident Response Lifecycle
Written to enterprise SOC standards, suitable for Tier 1–3 analysts, threat hunters, and DFIR practitioners, and designed for repeatable, auditable use.
AI-Driven SOC Prompt Library
Aligned to MITRE ATT&CK & NIST IR
1. Master SOC AI Prompt Standard (Use This Everywhere)
This is the base wrapper every analyst should use.
You are a senior SOC / DFIR analyst operating in an enterprise environment.
Environment:
- Platform(s): Microsoft Defender XDR, Microsoft Sentinel
- OS focus: Windows enterprise (servers, endpoints, Entra ID)
- Logging: MDE, Entra ID, M365, Azure Activity, Security Events
Investigation Phase:
- NIST IR Phase: [Preparation | Detection & Analysis | Containment | Eradication | Recovery | Lessons Learned]
Objective:
- [Triage | Investigation | Threat Hunt | Detection Engineering | Incident Response]
Data Provided:
- [Alerts, logs, KQL output, timelines]
Requirements:
- Map findings to MITRE ATT&CK (Tactic → Technique)
- Base conclusions on evidence only
- Highlight assumptions and confidence level
- Recommend next investigative actions
Output Format:
1. Summary of Findings
2. MITRE ATT&CK Mapping
3. Evidence Observed
4. Risk Assessment
5. Recommended Actions
6. Follow-up Queries2. Defender XDR Prompt Pack
2.1 Alert Triage (Tier 1)
NIST Phase: Detection & Analysis MITRE: Initial Access / Execution
2.2 Advanced Hunting (Tier 2)
NIST Phase: Detection & Analysis MITRE: Execution, Persistence, Credential Access
2.3 Device Compromise Investigation (Tier 2–3)
NIST Phase: Detection & Analysis MITRE: Lateral Movement, Persistence
3. Microsoft Sentinel Prompt Pack
3.1 Incident Correlation
NIST Phase: Detection & Analysis MITRE: Multi-stage attack chains
3.2 KQL Detection Engineering
NIST Phase: Preparation MITRE: Technique-level detections
3.3 Threat Hunting in Sentinel
NIST Phase: Detection & Analysis MITRE: Discovery, Lateral Movement
4. Junior Analyst AI Playbooks
4.1 Tier-1 Alert Handling Playbook
Trigger: New alert Goal: Decide close vs escalate
4.2 “What Should I Check Next?” Playbook
Goal: Teach investigative thinking
4.3 False Positive Validation Playbook
5. DFIR Prompt Pack (Tier 3 / IR)
5.1 Host-Based Forensics
NIST Phase: Containment & Eradication MITRE: Persistence, Defence Evasion
5.2 Credential Compromise Investigation
MITRE: Credential Access (TA0006)
6. MITRE ATT&CK–Aligned Prompt Examples
Technique-Specific Prompt (T1059 – Command & Scripting)
Tactic-Driven Prompt (Lateral Movement)
7. NIST IR Lifecycle Mapping (Quick Reference)
Preparation
Detection engineering, playbooks, tuning
Detection & Analysis
Alert triage, hunting, investigation
Containment
Impact analysis, response guidance
Eradication
Root cause validation
Recovery
Monitoring recommendations
Lessons Learned
Control improvements, reporting
8. Operational Guidance
Use AI to:
Accelerate analysis
Improve consistency
Train junior analysts
Standardise investigations
Do not use AI to:
Replace evidence validation
Make legal determinations
Execute destructive actions
Last updated