Lab 14
Intermediate
AI-Assisted IR Report Generation
Objective
Use AI to transform raw investigation notes into a structured IR report. You will provide investigation data and prompt the AI to produce each section of the report, then review and refine the output.
Required: Access to Claude. Use the scenario data provided below.
Scenario: AiTM Incident Investigation Notes
You have completed the investigation of an AiTM credential phishing incident. Your raw notes:
Incident: INC-2026-04-015
Reported: 2026-04-12 14:30 UTC by DET-SOC-002 (MFA fatigue)
Timeline:
- 14:22 - User k.patel received phishing email from
"it-security@northgateeng-update.com"
- 14:25 - User clicked link in email (Safe Links detonated,
classified clean at time of click — adversary delayed payload
activation)
- 14:26 - User entered credentials on AiTM proxy page
- 14:27-14:30 - 6 MFA push denials, then approval at 14:31
- 14:32 - Adversary accessed Outlook Web using stolen session token
from IP 198.51.100.77 (DigitalOcean, NL)
- 14:35 - Inbox forwarding rule created: forward "payment|invoice|
wire" to ext-collect@protonmail.com
- 14:36 - Evasion rule created: delete emails from
ext-collect@protonmail.com
- 14:37-15:10 - 412 emails accessed via MailItemsAccessed
- 15:02 - OAuth consent granted to "OneDrive Backup Service"
with Mail.ReadWrite
- No outbound BEC email sent (contained before execution)
Containment:
- 15:15 - Tokens revoked for k.patel
- 15:16 - Password reset forced
- 15:18 - Inbox rules deleted (forwarding + evasion)
- 15:20 - OAuth application "OneDrive Backup Service" deleted
- 15:25 - Phishing URL blocked at proxy
- 15:30 - Email purged from all recipients (12 users received it,
only k.patel clicked)
Impact:
- 412 emails read by adversary (procurement, contains vendor
payment details)
- No data exfiltrated via forwarding (contained before any
forwarded emails were sent)
- No outbound BEC attempted
- OAuth app authenticated 3 times before deletion (Mail.Read
access confirmed)
Step 1: Generate the executive summary
Role: You are writing an executive incident summary for the CISO.
Context: [Paste the investigation notes above]
Task: Write a one-page executive summary with:
1. Incident overview (2-3 sentences — what happened)
2. Business impact assessment (what was exposed, what was prevented)
3. Response effectiveness (how fast, what worked)
4. Risk assessment (residual risk after containment)
5. 3 recommended improvements (specific, actionable)
Constraints: No technical jargon. No KQL. No log table names.
The CISO needs to understand this in 2 minutes and decide whether
to escalate to the board.
Evaluate: Does the summary accurately reflect the incident? Is the language CISO-appropriate? Are the recommendations specific and actionable?
Step 2: Generate the technical timeline
Role: You are writing the technical timeline for the full IR report.
Context: [Same investigation notes]
Task: Produce a chronological timeline table with columns:
Timestamp | Source | Event | Adversary action | SOC action
Include every event from the investigation notes. Flag the gap
between adversary access (14:32) and SOC containment (15:15) as
the dwell time.
Step 3: Generate improvement recommendations
Role: You are conducting the post-incident review.
Context: [Same investigation notes]
Task: Identify:
1. What detection worked (what caught this incident)
2. What detection failed (what should have caught it earlier)
3. What hardening would have prevented the initial compromise
4. What hardening would have prevented the persistence (forwarding,
OAuth)
5. Specific action items with owners, deadlines, and success criteria
Step 4: Compile and review
Combine the AI-generated sections into a complete IR report. Review each section:
- Is the executive summary accurate and appropriately non-technical?
- Does the timeline include all events with correct timestamps?
- Are the recommendations specific and achievable?
- What did the AI add that you had not considered?
- What did the AI get wrong or misrepresent?
Make corrections and save the final report as a reference for future AI-assisted IR documentation.
Verification checklist
- Executive summary generated and reviewed for accuracy
- Technical timeline generated with all events
- Improvement recommendations generated with specific actions
- Complete report assembled from AI sections
- AI output reviewed against your expert judgment
- Corrections and refinements documented