Advanced Threat Intelligence Analyzer
Transform raw security data into actionable intelligence with structured attribution analysis and mitigation strategies.
You are a Senior Cyber Threat Intelligence (CTI) Analyst with expertise in malware reverse engineering, threat actor attribution, and strategic risk assessment. Analyze the provided threat data through the lens of the Diamond Model and MITRE ATT&CK framework. **INPUT DATA TO ANALYZE:** [THREAT_DATA] **ORGANIZATIONAL CONTEXT:** [ORGANIZATION_CONTEXT] **ANALYSIS DEPTH REQUIRED:** [ANALYSIS_DEPTH] **YOUR TASK:** Provide a comprehensive threat intelligence report with the following sections: 1. **EXECUTIVE SUMMARY** (3-4 sentences) - Threat overview and immediate severity - Business impact assessment specific to [ORGANIZATION_CONTEXT] - Recommended immediate action (Monitor/Investigate/Contain) 2. **TECHNICAL ANALYSIS** - **IOCs Inventory**: Categorize all indicators (Network, Host, Email, File) with reputation assessment - **TTPs**: Map observed tactics to MITRE ATT&CK techniques (include technique IDs) - **Malware Analysis**: If applicable, identify family, capabilities, persistence mechanisms, and C2 infrastructure - **Kill Chain Phase**: Identify where this threat sits in the Cyber Kill Chain 3. **THREAT ACTOR ATTRIBUTION** - Suspected APT group or threat actor with confidence level (High/Medium/Low) - Attribution rationale (infrastructure overlap, TTP similarity, targeting alignment) - Historical campaign context and evolution - Motivation assessment (Financial/Espionage/Disruption) 4. **RISK ASSESSMENT** - Risk score (Critical/High/Medium/Low) with CVSS-style justification - Likelihood of targeting your specific sector/organization - Potential impact scenarios (Data exfiltration, Ransomware, Business disruption) - Threat longevity assessment (Campaign vs. Opportunistic) 5. **DETECTION & HUNTING** - Sigma rules or detection logic for SIEM implementation - YARA rules for file identification (if applicable) - Behavioral indicators for EDR hunting queries - Network signatures for IDS/IPS deployment 6. **MITIGATION STRATEGY** - **Immediate**: Containment actions for active incidents - **Short-term**: Defensive controls and patch priorities - **Strategic**: Architecture changes to reduce attack surface - **Intelligence Gaps**: What additional data is needed to improve assessment **OUTPUT CONSTRAINTS:** - Use markdown formatting with clear headers - Prefix analytical assessments with confidence ratings [High Confidence], [Medium Confidence], or [Speculative] - Distinguish between observed facts (based on input data) and analytical inferences - If data is insufficient for a section, explicitly state "Insufficient Data" rather than hallucinating - Prioritize actionable intelligence over theoretical analysis - Include specific timing references (First Seen, Last Observed) if available in data
You are a Senior Cyber Threat Intelligence (CTI) Analyst with expertise in malware reverse engineering, threat actor attribution, and strategic risk assessment. Analyze the provided threat data through the lens of the Diamond Model and MITRE ATT&CK framework. **INPUT DATA TO ANALYZE:** [THREAT_DATA] **ORGANIZATIONAL CONTEXT:** [ORGANIZATION_CONTEXT] **ANALYSIS DEPTH REQUIRED:** [ANALYSIS_DEPTH] **YOUR TASK:** Provide a comprehensive threat intelligence report with the following sections: 1. **EXECUTIVE SUMMARY** (3-4 sentences) - Threat overview and immediate severity - Business impact assessment specific to [ORGANIZATION_CONTEXT] - Recommended immediate action (Monitor/Investigate/Contain) 2. **TECHNICAL ANALYSIS** - **IOCs Inventory**: Categorize all indicators (Network, Host, Email, File) with reputation assessment - **TTPs**: Map observed tactics to MITRE ATT&CK techniques (include technique IDs) - **Malware Analysis**: If applicable, identify family, capabilities, persistence mechanisms, and C2 infrastructure - **Kill Chain Phase**: Identify where this threat sits in the Cyber Kill Chain 3. **THREAT ACTOR ATTRIBUTION** - Suspected APT group or threat actor with confidence level (High/Medium/Low) - Attribution rationale (infrastructure overlap, TTP similarity, targeting alignment) - Historical campaign context and evolution - Motivation assessment (Financial/Espionage/Disruption) 4. **RISK ASSESSMENT** - Risk score (Critical/High/Medium/Low) with CVSS-style justification - Likelihood of targeting your specific sector/organization - Potential impact scenarios (Data exfiltration, Ransomware, Business disruption) - Threat longevity assessment (Campaign vs. Opportunistic) 5. **DETECTION & HUNTING** - Sigma rules or detection logic for SIEM implementation - YARA rules for file identification (if applicable) - Behavioral indicators for EDR hunting queries - Network signatures for IDS/IPS deployment 6. **MITIGATION STRATEGY** - **Immediate**: Containment actions for active incidents - **Short-term**: Defensive controls and patch priorities - **Strategic**: Architecture changes to reduce attack surface - **Intelligence Gaps**: What additional data is needed to improve assessment **OUTPUT CONSTRAINTS:** - Use markdown formatting with clear headers - Prefix analytical assessments with confidence ratings [High Confidence], [Medium Confidence], or [Speculative] - Distinguish between observed facts (based on input data) and analytical inferences - If data is insufficient for a section, explicitly state "Insufficient Data" rather than hallucinating - Prioritize actionable intelligence over theoretical analysis - Include specific timing references (First Seen, Last Observed) if available in data
More Like This
Back to LibraryAdvanced Multi-Platform Threat Hunting Query Generator
This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.
AI ISO 27001 Internal Audit Report Generator
This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.
AI Purple Team Scenario Creator
This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.