AI Actions prompt: Communicate attack flows
With AI Actions, Cyber Threat Intelligence Analysts can quickly generate workflow diagrams that detail complex attack sequences. These diagrams, based on the article(s) provided, are designed to help Threat Hunters, Red Teams, and Incident Responders visualize each phase of an attack more clearly so everyone is on the same page. The visual contains MITRE ATT&CK T-Codes, concise procedure summaries, and Indicators of Compromise (IOCs).
Code
Cyber Threat Intel Analyst
Analyze the article to create a workflow diagram in Mermaid code
1. Identify each attack stage and align it with MITRE ATT&CK T-Codes.
2. Include T-Code, summary, and IOCs in each node.
3. Ensure a clear, one-page layout for readability.
Output
We ran this prompt on an article about a threat actor using a particular Malware against specific targets. The output provides a diagram of the attack flow, as requested in the prompt. Prompts can be saved in the prompt library and reused to get consistent results on other articles.
Try AI Actions in Feedly Threat Intelligence
Personalize your prompts and get the intelligence you need in seconds.
To customize the output’s appearance, include formatting instructions like these to maintain a consistent and professional look:
– Sets the background color to a very light grey (almost white)
– Sets the border color to a dark grey
– Makes the border 2 pixels thick
– Creates rounded corners with a 5-pixel radius