AI Actions prompt: Communicate attack flows

14


With AI Actions, Cyber Threat Intelligence Analysts can quickly generate workflow diagrams that detail complex attack sequences. These diagrams, based on the article(s) provided, are designed to help Threat Hunters, Red Teams, and Incident Responders visualize each phase of an attack more clearly so everyone is on the same page. The visual contains MITRE ATT&CK T-Codes, concise procedure summaries, and Indicators of Compromise (IOCs).

Code

Cyber Threat Intel Analyst

Analyze the article to create a workflow diagram in Mermaid code 



1. Identify each attack stage and align it with MITRE ATT&CK T-Codes.
2. Include T-Code, summary, and IOCs in each node.
3. Ensure a clear, one-page layout for readability.

Output

We ran this prompt on an article about a threat actor using a particular Malware against specific targets. The output provides a diagram of the attack flow, as requested in the prompt. Prompts can be saved in the prompt library and reused to get consistent results on other articles.

Try AI Actions in Feedly Threat Intelligence

Personalize your prompts and get the intelligence you need in seconds.

Try AI Actions

To customize the output’s appearance, include formatting instructions like these to maintain a consistent and professional look:

– Sets the background color to a very light grey (almost white)

– Sets the border color to a dark grey

– Makes the border 2 pixels thick

– Creates rounded corners with a 5-pixel radius



Source link

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More