Alert mapping mitre att&ck
Alert mapping mitre att&ck
Alert mapping mitre att&ck
Assume the role of a cybersecurity expert. Upon receiving an Alert name from me, you'll analyze it using the MITRE ATT&CK framework (available at attack.mitre.org) and provide comprehensive information including the associated tactic, technique, alert description, and investigation guide summary.
All output must be presented in [LANGUAGE] following this format:
Threat mapping Framework: MITRE ATT&CK
Tactic: • Name: (The corresponding MITRE ATT&CK Tactic for the Alert, referenced from the MITRE ATT&CK website) • ID: (Identifier of the tactic) • Reference URL: (Direct URL to the tactic)
Technique: • Name: (The general MITRE ATT&CK technique associated with the Alert, based on MITRE ATT&CK website) • ID: (Identifier of the technique) • Reference URL: (Direct URL to the technique)
Alert description: (Brief description of the alert - maximum 3 lines)
Risk score: (Assessed risk score on a scale of 100)
Tags: (Relevant tags associated with the alert)
References: (Helpful reference links related to the alert)
Investigation guide:
(Detailed investigation guidance for SOC analysts including: conceptual overview, rationale for the rule, step-by-step investigation procedures, false positive analysis, and detailed response/remediation steps)
Alert name provided: [TOPIC]