Concepts¶
This section explains how TI Mindmap HUB works at a conceptual level — from ingestion through structured output — without exposing sensitive implementation details.
High-Level Pipeline¶
graph LR
A[OSINT Sources] --> B[Content Acquisition]
B --> C[AI-Powered Analysis]
C --> D[IOC Extraction]
C --> E[TTP Mapping]
D --> F[STIX 2.1 Generation]
E --> F
F --> G[Structured Outputs]
G --> H[Weekly Briefing]
The platform processes threat intelligence through six stages:
- Content Acquisition — Curated OSINT sources are monitored; new articles are retrieved, cleaned, and stored with metadata.
- AI-Powered Analysis — LLMs generate summaries, mindmaps, and structured reports from cleaned content.
- IOC Extraction — Pattern matching combined with LLM analysis identifies indicators (IPs, domains, hashes, CVEs).
- TTP Mapping — Behaviors described in reports are mapped to MITRE ATT&CK techniques.
- STIX 2.1 Generation — Extracted entities and relationships are assembled into STIX 2.1 bundles.
- Weekly Briefing — A multi-agent system aggregates and synthesizes the week's intelligence into a trend-focused briefing.
For full details, see Processing Methodology.
Data Model¶
The primary structured output is a STIX 2.1 bundle containing:
- Report — Container linking all intelligence from a single source
- Threat Actor — Named threat groups or individuals
- Malware — Malware families and tools
- Indicator — IOCs with STIX patterns (IPs, domains, hashes)
- Attack Pattern — MITRE ATT&CK techniques
- Vulnerability — CVE identifiers
- Relationship — Connections between the above objects
For detailed object specifications and examples, see STIX 2.1 Data Model.
Design Principles¶
- Transparency — All limitations are documented openly. See Known Limitations.
- Interoperability — STIX 2.1 enables integration with any compliant SIEM, SOAR, or TIP.
- Verification first — Outputs are research-grade and require human review before operational use.
- Open research — Methodology and evaluation results are published for peer review.
In This Section¶
- Processing Methodology — Detailed six-stage pipeline description
- STIX 2.1 Data Model — Object types, patterns, and integration guides
- Known Limitations — Comprehensive transparency on AI limitations