Concepts¶
This section explains how TI Mindmap HUB works at a conceptual level — from ingestion through structured output and analyst-facing experience — without exposing sensitive implementation details.
High-Level Pipeline¶
flowchart LR
A[OSINT Sources and<br/>Analyst Submissions] --> B[Content Acquisition]
B --> C[Normalization and<br/>Processing]
C --> D[Threat Analysis Layer]
D --> E1[IOC Extraction]
D --> E2[TTP Mapping<br/>to ATT&CK]
D --> E3[CVE Correlation]
D --> E4[Actor and Malware<br/>Context]
D --> E5[Summary and Mindmap<br/>Generation]
E1 --> F[STIX 2.1 Structuring]
E2 --> F
E3 --> F
E4 --> F
E5 --> G[Article Knowledge<br/>Artifacts]
F --> H[Analyst Frontend<br/>by Article]
G --> H
H --> I1[Intel Graph and<br/>STIX JSON Download]
H --> I2[Diamond Model and<br/>Attack Flow]
H --> I3[AI Summary and<br/>TI Mindmap]
H --> I4[Advanced IOC Table<br/>and Export]
H --> I5[CVE Risk Context<br/>and References]
H --> I6[TTP Catalog and<br/>ATT&CK Heatmap]
H --> I7[5W Context and<br/>Source Report]
The platform processes threat intelligence through a multi-stage pipeline:
- Content Acquisition — OSINT sources are continuously monitored and analyst submissions are accepted via the web interface or MCP
submit_articletool. - Normalization and Processing — Raw content is cleaned, parsed, and prepared for analysis.
- Threat Analysis Layer — LLMs perform parallel extraction and synthesis across five specialized branches:
- IOC Extraction — Indicators of Compromise (IPs, domains, hashes, emails) with confidence scoring
- TTP Mapping — Behavioral mapping to MITRE ATT&CK techniques and tactics
- CVE Correlation — Vulnerability extraction with risk context (CVSS, exploit status, patch availability)
- Actor and Malware Context — Threat actor attribution and malware family identification
- Summary and Mindmap Generation — AI-powered summaries and visual threat models
- STIX 2.1 Structuring — Extracted entities and relationships are assembled into validated STIX 2.1 bundles.
- Analyst Frontend — All outputs converge into a per-article experience with multiple analysis tabs.
Detailed Pipeline¶
flowchart TD
A1[Article URL or Manual<br/>Content Submission] --> A2[Submission Validation<br/>and Tracking]
A2 --> A3[Raw Article Storage]
A3 --> A4[Processing Trigger]
A4 --> B1[Text Parsing<br/>and Cleanup]
B1 --> B2[Entity Extraction<br/>Pipeline]
B2 --> B3[Normalization and<br/>Confidence Scoring]
B3 --> C1[IOC Detection<br/>and Enrichment]
B3 --> C2[TTP Extraction and<br/>ATT&CK Mapping]
B3 --> C3[CVE Extraction with<br/>Risk Context]
B3 --> C4[Threat Actor and<br/>Malware Extraction]
B3 --> C5[Summary and Mindmap<br/>Synthesis]
C1 --> D1[Indicators and<br/>Observables]
C2 --> D2[Attack Pattern<br/>Objects]
C3 --> D3[Vulnerability<br/>Objects]
C4 --> D4[Actor and Malware<br/>Objects]
D1 --> E1[STIX Relationship<br/>Generation]
D2 --> E1
D3 --> E1
D4 --> E1
E1 --> E2[STIX Bundle Assembly<br/>and Validation]
E2 --> E3[Structured Storage<br/>and Retrieval API]
E3 --> F0[Per-Article Frontend<br/>Experience]
F0 --> F1[Header Metadata]
F0 --> F2[Intel Graph Tab]
F0 --> F3[Diamond Model Tab]
F0 --> F4[AI Summary Tab]
F0 --> F5[TI Mindmap Tab]
F0 --> F6[IOCs Tab]
F0 --> F7[CVEs Tab]
F0 --> F8[TTP Catalog Tab]
F0 --> F9[Attack Flow Tab]
F0 --> F10[5W Context Tab]
F0 --> F11[ATT&CK Heatmap Tab]
F0 --> F12[Source Report Tab]
Ingestion¶
- Article URL or Manual Submission — Reports enter the pipeline via OSINT monitoring, the web submission form, or the MCP
submit_articletool. - Submission Validation and Tracking — The URL is validated, deduplicated, and assigned a tracking identifier.
- Raw Article Storage — Original content is preserved for reference and reproducibility.
- Processing Trigger — The article is queued for automated analysis.
Normalization¶
- Text Parsing and Cleanup — HTML is stripped, content is converted to clean text, and metadata (source, date, URL) is preserved.
- Entity Extraction Pipeline — LLMs and pattern matchers identify candidate entities across the text.
- Normalization and Confidence Scoring — Extracted entities are validated, deduplicated, and assigned confidence levels (high, medium, low).
Analysis Branches¶
The analysis layer processes five extraction branches in parallel:
| Branch | Input | Output | Key Details |
|---|---|---|---|
| IOC Detection and Enrichment | Normalized text | IPs, domains, URLs, hashes, emails | Regex + LLM hybrid; whitelisting filters benign infrastructure |
| TTP Extraction and ATT&CK Mapping | Report behaviors | Technique IDs, tactics, confidence | Behavioral analysis, not keyword matching |
| CVE Extraction with Risk Context | Vulnerability mentions | CVE IDs with CVSS, exploit status, patch/PoC | Cross-referenced with enrichment sources |
| Threat Actor and Malware Extraction | Attribution context | Named groups, malware families, tools | Contextual extraction preserving relationships |
| Summary and Mindmap Synthesis | Full report content | AI summary, visual mindmap, 5W analysis | Concise analytical artifacts for rapid triage |
STIX 2.1 Structuring¶
The backend assembles all extraction outputs — IOCs, CVEs, TTPs, actors, and malware — into a unified STIX 2.1 bundle:
- STIX Relationship Generation — Semantic relationships (
uses,indicates,attributed-to,exploits) are created between extracted objects. - STIX Bundle Assembly and Validation — Objects are assembled into a STIX 2.1 bundle, validated against the JSON Schema and pattern syntax.
- Structured Storage and Retrieval API — Bundles and artifacts are stored and made available via the web interface, MCP tools, and REST API.
Per-Article Frontend Experience¶
For each processed article, the analyst frontend presents a comprehensive analysis through a tabbed interface:
Header Metadata¶
Every article page displays: title, source, publication date, link to original report, bookmark, and PDF export.
Analysis Tabs¶
| Tab | Description |
|---|---|
| Intel Graph | Interactive STIX relationship graph with graph view and JSON view. Displays object count and provides STIX bundle download. |
| Diamond Model | Diamond Model visualization mapping adversary, capability, infrastructure, and victim. |
| AI Summary | AI-generated technical summary of the report. |
| TI Mindmap | Interactive mindmap connecting threat actors, campaigns, malware, TTPs, IOCs, and targeted sectors. |
| IOCs | Advanced IOC table showing only high and medium confidence indicators, with JSON export. Low-confidence IOCs remain available in the downloadable file. |
| CVEs | Vulnerability details including CVSS severity, exploited/patch/PoC status, affected products, and correlated references. |
| TTP Catalog | Complete catalog of MITRE ATT&CK techniques identified in the report. |
| Attack Flow | Probable attack execution sequence reconstructed from the report. |
| 5W Context | Structured root-cause analysis (Who, What, When, Where, Why). |
| ATT&CK Heatmap | Visual heatmap of mapped ATT&CK techniques across tactics. |
| Source Report | Original report content for reference and verification. |
Data Model¶
The primary structured output is a STIX 2.1 bundle containing:
- Report — Container linking all intelligence from a single source
- Threat Actor — Named threat groups or individuals
- Malware — Malware families and tools
- Indicator — IOCs with STIX patterns (IPs, domains, hashes)
- Attack Pattern — MITRE ATT&CK techniques
- Vulnerability — CVE identifiers with risk context
- Relationship — Connections between the above objects
For detailed object specifications and examples, see STIX 2.1 Data Model.
Design Principles¶
- Transparency — All limitations are documented openly. See Known Limitations.
- Interoperability — STIX 2.1 enables integration with any compliant SIEM, SOAR, or TIP.
- Verification first — Outputs are research-grade and require human review before operational use.
- Open research — Methodology and evaluation results are published for peer review.
In This Section¶
- Processing Methodology — Detailed pipeline stages and technology stack
- STIX 2.1 Data Model — Object types, patterns, and integration guides
- Known Limitations — Comprehensive transparency on AI limitations