AI-Powered Incident Response

STAY AHEAD
OF THE
THREAT.

Practical AI guidance for Incident Responders. Cut through the noise, accelerate your investigations, and leverage LLMs the way IR professionals actually work.

log_triage_prompt.txt

# RAPID LOG TRIAGE


ROLE:

You are a senior DFIR analyst

specializing in Windows and

cloud environments.


TASK:

Analyze log excerpt and provide:

  1. Plain-English summary

  2. Suspicious indicators

  3. MITRE ATT&CK techniques

  4. Containment actions


--- PASTE LOG DATA BELOW ---

{{log_data}}

Triage Automation Log Analysis with LLMs Threat Intel Summarization Malware Reverse Engineering Assist DFIR Playbook Generation IOC Extraction & Enrichment Incident Timeline Builder Report Drafting at Machine Speed Triage Automation Log Analysis with LLMs Threat Intel Summarization Malware Reverse Engineering Assist DFIR Playbook Generation IOC Extraction & Enrichment Incident Timeline Builder Report Drafting at Machine Speed

// AI Tools & Resources

YOUR AI ARSENAL

Curated tools, workflows, and integrations that give IR teams an actual edge — not just hype.

🔍

Log Triage GPT

Feed raw SIEM output and get structured summaries, anomaly highlights, and prioritised next steps instantly.

Investigation
🧬

Malware Analyst Assist

Deobfuscate scripts, explain shellcode behaviour, and generate YARA rules from sample descriptions.

Malware / RE
📡

Threat Intel Digest

Paste raw threat reports and extract TTPs, IOCs, and MITRE ATT&CK mappings in seconds.

Threat Intel
📋

Playbook Generator

Describe an incident type and receive a step-by-step DFIR playbook tailored to your environment.

Playbooks
🕒

Timeline Reconstructor

Turn fragmented log snippets and artefacts into a clean, chronological incident narrative.

Forensics
📝

Report Drafter

Go from raw IR notes to an executive-ready incident report with structured findings and recommendations.

Reporting

// Prompt Library

READY-TO-USE
IR PROMPTS

Copy, adapt, and deploy. Every prompt is field-tested for real incident response workflows.

Rapid Log Triage Investigation

ROLE:

You are a senior DFIR analyst specializing in Windows and cloud environments.


TASK:

Analyze the following log excerpt and provide:

  1. A plain-English summary of what happened

  2. Suspicious indicators (IPs, hashes, user agents, commands)

  3. Likely MITRE ATT&CK techniques observed

  4. Recommended immediate containment actions


FORMAT:

Use structured headers. Flag high-severity findings with [CRITICAL].


--- PASTE LOG DATA BELOW ---

{{log_data}}

ROLE: You are a senior DFIR analyst specializing in Windows and cloud environments.

TASK: Analyze the following log excerpt and provide:
  1. A plain-English summary of what happened
  2. Suspicious indicators (IPs, hashes, user agents, commands)
  3. Likely MITRE ATT&CK techniques observed
  4. Recommended immediate containment actions

FORMAT: Use structured headers. Flag high-severity findings with [CRITICAL].

--- PASTE LOG DATA BELOW ---
{{log_data}}
Malware Script Deobfuscation Malware

ROLE:

You are a malware analyst specializing in script-based threats.


TASK:

Analyze the following obfuscated code and provide:

  1. Deobfuscated / decoded version (best effort)

  2. Plain-English summary of what the code does

  3. Extracted IOCs (IPs, domains, hashes, registry keys)

  4. MITRE ATT&CK techniques observed

  5. Suggested YARA rule snippet based on unique strings


FORMAT:

Use structured headers. Mark critical IOCs with [IOC].


--- PASTE SCRIPT BELOW ---

{{obfuscated_script}}

ROLE: You are a malware analyst specializing in script-based threats.

TASK: Analyze the following obfuscated code and provide:
  1. Deobfuscated / decoded version (best effort)
  2. Plain-English summary of what the code does
  3. Extracted IOCs (IPs, domains, hashes, registry keys)
  4. MITRE ATT&CK techniques observed
  5. Suggested YARA rule snippet based on unique strings

FORMAT: Use structured headers. Mark critical IOCs with [IOC].

--- PASTE SCRIPT BELOW ---
{{obfuscated_script}}
IOC Enrichment & Triage Threat Intel

ROLE:

You are a threat intelligence analyst.


TASK:

For each indicator listed below, provide:

  1. Indicator type (IP, domain, file hash, URL)

  2. Likely threat category (C2, phishing, malware dist., recon)

  3. Recommended investigation pivot points

  4. Suggested immediate action (block / monitor / escalate)


FORMAT:

Markdown table — Indicator | Type | Category | Pivots | Action


--- PASTE INDICATORS BELOW ---

{{indicators}}

ROLE: You are a threat intelligence analyst.

TASK: For each indicator listed below, provide:
  1. Indicator type (IP, domain, file hash, URL)
  2. Likely threat category (C2, phishing, malware distribution, recon)
  3. Recommended investigation pivot points
  4. Suggested immediate action (block, monitor, escalate)

FORMAT: Markdown table — Indicator | Type | Threat Category | Pivots | Action

--- PASTE INDICATORS BELOW ---
{{indicators}}
Detection Rule Drafting Detection

ROLE:

You are a detection engineer with deep SIEM and EDR expertise.


TASK:

Based on the behavior described below, generate:

  1. A Sigma detection rule

  2. KQL equivalent (Microsoft Sentinel)

  3. SPL equivalent (Splunk)

  4. Key false positive scenarios to account for

  5. Tuning recommendations


FORMAT:

Fenced code blocks per rule, clearly annotated.


--- DESCRIBE ATTACKER BEHAVIOR BELOW ---

{{attacker_behavior}}

ROLE: You are a detection engineer with deep SIEM and EDR expertise.

TASK: Based on the attacker behavior described below, generate:
  1. A Sigma detection rule
  2. KQL equivalent (Microsoft Sentinel)
  3. SPL equivalent (Splunk)
  4. Key false positive scenarios to account for
  5. Tuning recommendations

FORMAT: Fenced code blocks per rule, clearly annotated.

--- DESCRIBE ATTACKER BEHAVIOR BELOW ---
{{attacker_behavior}}
Executive Incident Briefing Reporting

ROLE:

You are a senior IR consultant preparing an executive briefing.


TASK:

Convert the technical summary below into a board-ready briefing:

  1. Incident overview (2-3 sentences, zero technical jargon)

  2. Business impact (actual or potential)

  3. Current containment status

  4. Three most important actions taken

  5. Recommended next steps


AUDIENCE:

CISO and non-technical executives. Spell out all acronyms.


--- PASTE TECHNICAL SUMMARY BELOW ---

{{technical_summary}}

ROLE: You are a senior IR consultant preparing an executive briefing.

TASK: Convert the technical summary below into a board-ready briefing:
  1. Incident overview (2-3 sentences, zero technical jargon)
  2. Business impact (actual or potential)
  3. Current containment status
  4. Three most important actions taken
  5. Recommended next steps

AUDIENCE: CISO and non-technical executives. Spell out all acronyms.

--- PASTE TECHNICAL SUMMARY BELOW ---
{{technical_summary}}
Threat Hunt Hypothesis Generator Threat Hunting

ROLE:

You are an experienced threat hunter.


TASK:

Given the threat actor or TTP described below, generate:

  1. Three hunt hypotheses (specific behaviors to search for)

  2. Data sources required per hypothesis

  3. Detection logic or pseudo-queries

  4. Success criteria for each hunt


FORMAT:

Numbered hypotheses with four sub-sections each. Name specific logs, fields, and event IDs where applicable.


--- DESCRIBE THREAT ACTOR OR TTP BELOW ---

{{threat_actor_or_ttp}}

ROLE: You are an experienced threat hunter.

TASK: Given the threat actor or TTP described below, generate:
  1. Three hunt hypotheses (specific behaviors to search for)
  2. Data sources required per hypothesis
  3. Detection logic or pseudo-queries
  4. Success criteria for each hunt

FORMAT: Numbered hypotheses with four sub-sections each. Name specific logs, fields, and event IDs where applicable.

--- DESCRIBE THREAT ACTOR OR TTP BELOW ---
{{threat_actor_or_ttp}}
Incident Timeline Reconstruction Forensics

ROLE:

You are a forensic analyst reconstructing an attack timeline.


TASK:

From the artifacts and log fragments below:

  1. Build a chronological event timeline (UTC where possible)

  2. Identify key attacker actions at each stage

  3. Note any evidentiary gaps or missing data

  4. Map events to MITRE ATT&CK Kill Chain phases


FORMAT:

Markdown table — Timestamp (UTC) | Event | Data Source | ATT&CK Technique


--- PASTE ARTIFACTS AND LOG FRAGMENTS BELOW ---

{{artifacts_and_logs}}

ROLE: You are a forensic analyst reconstructing an attack timeline.

TASK: From the artifacts and log fragments below:
  1. Build a chronological event timeline (UTC where possible)
  2. Identify key attacker actions at each stage
  3. Note any evidentiary gaps or missing data
  4. Map events to MITRE ATT&CK Kill Chain phases

FORMAT: Markdown table — Timestamp (UTC) | Event | Data Source | ATT&CK Technique

--- PASTE ARTIFACTS AND LOG FRAGMENTS BELOW ---
{{artifacts_and_logs}}

// Real-World Applications

HOW IR TEAMS
USE AI TODAY

01 //

Accelerated Alert Triage

Reduce mean-time-to-triage by feeding alert queues into LLMs to score, group, and summarise before an analyst even touches them.

02 //

Automated IOC Enrichment

Query threat intel feeds, correlate context, and produce enriched IOC summaries without switching between a dozen browser tabs.

03 //

Detection Rule Drafting

Describe attacker behaviour in plain English and get draft Sigma, KQL, or SPL detection rules to validate and tune.

04 //

Executive Incident Briefings

Translate technical incident findings into clear, jargon-free summaries for CISO and board-level communication.

05 //

Tabletop Exercise Simulation

Use AI to generate realistic adversary scenarios, inject injects, and debrief your team — without a consultant's day rate.

Staff IR Engineer · Active Practitioner

BUILT BY AN
IR ENGINEER.
FOR IR TEAMS.

The Digital Sentinel is a practitioner-led resource. No vendor fluff. No generic AI hot-takes. Just battle-tested guidance from the trenches of real incident response, focused on making AI work for you — not the other way around.

Read My Story

Why AI for IR?

Modern incidents move faster than any team can manually track. AI doesn't replace analysts — it removes the cognitive tax so you can focus on what matters: decisions, not data wrangling.

73%
Faster triage
with AI assist
More alerts
reviewed/analyst
No vendor
lock-in