TDAgent / exfiltration_ticket.txt
pedrobento988's picture
examples_provided_in_interface (#20)
3fe27ba verified
Handle the following ticket by deducing its associated MITRE technique and performing the usual course-of-action:
{
"Ticket_ID": "INC-2025-0234",
"Created_Date": "2025-06-05 03:14:22 UTC",
"Last_Updated": "2025-06-05 09:53:35 UTC",
"Status": "In Progress",
"Severity": "High",
"Category": "Data Exfiltration",
"Detection_Source": {
"System": "DLP (Data Loss Prevention)",
"Alert_ID": "DLP-2025-1842",
"Detection_Rule": "Large Data Transfer Pattern"
},
"Incident_Details": {
"Summary": "Unusual data transfer pattern detected from Finance Department workstation to unknown external IP",
"Description": "DLP system detected approximately 2.3GB of data being transferred from a workstation in Finance (IP: 192.168.45.132) to an unrecognized external IP address (176.65.144.169). The transfer occurred outside normal business hours and contained multiple compressed files with potential sensitive data.",
"Initial_Vector": "Potentially compromised credentials",
"Affected_Systems": [
"FINWS-132 (Finance Workstation)",
"Internal File Server FS-23"
]
},
"Technical_Data": {
"Source_IP": "192.168.45.132",
"Destination_IP": "176.65.144.169",
"Timestamp": "2025-06-05 03:12:45 UTC",
"Protocol": "HTTPS",
"Port": 7702,
"Data_Volume": "2.3GB",
"File_Types": ["zip", "rar", "xlsx", "pdf"]
},
"Actions_Taken": [
{
"Time": "2025-06-05 03:14:22 UTC",
"Action": "Automatic alert generated by DLP system",
"By": "DLP-System"
},
{
"Time": "2025-06-05 03:25:10 UTC",
"Action": "Workstation isolated from network",
"By": "SOC-Analyst-John"
},
{
"Time": "2025-06-05 04:15:33 UTC",
"Action": "Initial forensic snapshot created",
"By": "SOC-Analyst-Sarah"
},
{
"Time": "2025-06-05 09:53:35 UTC",
"Action": "Initiated full system memory dump",
"By": "IR-Team-Lead"
}
],
}