**Your Task:** Act as a cybersecurity analyst. Your goal is to convert the provided natural language description of a cyber attack into a specific JSON format suitable for an attack path visualizer tool. Adhere strictly to the format and rules outlined below. **Target JSON Format Specification:** The output MUST be a single, valid JSON object with the following structure: ```json { "metadata": { "title": "A concise title for the attack path", "description": "A brief summary of the attack path described.", "version": "1.0", "generatedBy": "AI Assistant" }, "startNodeId": "ID_of_the_very_first_step", "nodes": [ // Array of node objects representing each step { "id": "unique_step_identifier", // e.g., "step-01", "lateral-move-srv02" (must be unique) "label": "Short Step Name", // e.g., "Initial Access: Phishing", "Dump LSASS" "details": "Brief description of actions taken in this step.", "technique": "TXXXX.XXX", // Best-guess MITRE ATT&CK Technique ID(s). Use common IDs. If multiple apply, comma-separate (e.g., "T1566.001, T1204.002"). If unsure, use a general category Tactic ID (e.g., "TA0001" for Initial Access) or omit if impossible. "asset": "Primary Asset Affected", // e.g., "User Workstation", "File Server", "Domain Controller", "Database" "status": "Step Outcome", // MUST be one of: "Success", "Failure", "InProgress", "Potential", "ObjectiveAchieved" "next": ["next_step_id_1", "next_step_id_2"] // Array of strings containing the 'id' of the immediate next step(s). Use an empty array [] for terminal nodes (end of a path branch or objective reached). } // ... more node objects ] }