Skip to content

Concepts

This section explains how TI Mindmap HUB works at a conceptual level — from ingestion through structured output and analyst-facing experience — without exposing sensitive implementation details.


High-Level Pipeline

flowchart LR
    A[OSINT Sources and<br/>Analyst Submissions] --> B[Content Acquisition]
    B --> C[Normalization and<br/>Processing]
    C --> D[Threat Analysis Layer]
    D --> E1[IOC Extraction]
    D --> E2[TTP Mapping<br/>to ATT&CK]
    D --> E3[CVE Correlation]
    D --> E4[Actor and Malware<br/>Context]
    D --> E5[Summary and Mindmap<br/>Generation]
    E1 --> F[STIX 2.1 Structuring]
    E2 --> F
    E3 --> F
    E4 --> F
    E5 --> G[Article Knowledge<br/>Artifacts]
    F --> H[Analyst Frontend<br/>by Article]
    G --> H
    H --> I1[Intel Graph and<br/>STIX JSON Download]
    H --> I2[Diamond Model and<br/>Attack Flow]
    H --> I3[AI Summary and<br/>TI Mindmap]
    H --> I4[Advanced IOC Table<br/>and Export]
    H --> I5[CVE Risk Context<br/>and References]
    H --> I6[TTP Catalog and<br/>ATT&CK Heatmap]
    H --> I7[5W Context and<br/>Source Report]

The platform processes threat intelligence through a multi-stage pipeline:

  1. Content Acquisition — OSINT sources are continuously monitored and analyst submissions are accepted via the web interface or MCP submit_article tool.
  2. Normalization and Processing — Raw content is cleaned, parsed, and prepared for analysis.
  3. Threat Analysis Layer — LLMs perform parallel extraction and synthesis across five specialized branches:
    • IOC Extraction — Indicators of Compromise (IPs, domains, hashes, emails) with confidence scoring
    • TTP Mapping — Behavioral mapping to MITRE ATT&CK techniques and tactics
    • CVE Correlation — Vulnerability extraction with risk context (CVSS, exploit status, patch availability)
    • Actor and Malware Context — Threat actor attribution and malware family identification
    • Summary and Mindmap Generation — AI-powered summaries and visual threat models
  4. STIX 2.1 Structuring — Extracted entities and relationships are assembled into validated STIX 2.1 bundles.
  5. Analyst Frontend — All outputs converge into a per-article experience with multiple analysis tabs.

Detailed Pipeline

flowchart TD
    A1[Article URL or Manual<br/>Content Submission] --> A2[Submission Validation<br/>and Tracking]
    A2 --> A3[Raw Article Storage]
    A3 --> A4[Processing Trigger]
    A4 --> B1[Text Parsing<br/>and Cleanup]
    B1 --> B2[Entity Extraction<br/>Pipeline]
    B2 --> B3[Normalization and<br/>Confidence Scoring]
    B3 --> C1[IOC Detection<br/>and Enrichment]
    B3 --> C2[TTP Extraction and<br/>ATT&CK Mapping]
    B3 --> C3[CVE Extraction with<br/>Risk Context]
    B3 --> C4[Threat Actor and<br/>Malware Extraction]
    B3 --> C5[Summary and Mindmap<br/>Synthesis]
    C1 --> D1[Indicators and<br/>Observables]
    C2 --> D2[Attack Pattern<br/>Objects]
    C3 --> D3[Vulnerability<br/>Objects]
    C4 --> D4[Actor and Malware<br/>Objects]
    D1 --> E1[STIX Relationship<br/>Generation]
    D2 --> E1
    D3 --> E1
    D4 --> E1
    E1 --> E2[STIX Bundle Assembly<br/>and Validation]
    E2 --> E3[Structured Storage<br/>and Retrieval API]
    E3 --> F0[Per-Article Frontend<br/>Experience]
    F0 --> F1[Header Metadata]
    F0 --> F2[Intel Graph Tab]
    F0 --> F3[Diamond Model Tab]
    F0 --> F4[AI Summary Tab]
    F0 --> F5[TI Mindmap Tab]
    F0 --> F6[IOCs Tab]
    F0 --> F7[CVEs Tab]
    F0 --> F8[TTP Catalog Tab]
    F0 --> F9[Attack Flow Tab]
    F0 --> F10[5W Context Tab]
    F0 --> F11[ATT&CK Heatmap Tab]
    F0 --> F12[Source Report Tab]

Ingestion

  1. Article URL or Manual Submission — Reports enter the pipeline via OSINT monitoring, the web submission form, or the MCP submit_article tool.
  2. Submission Validation and Tracking — The URL is validated, deduplicated, and assigned a tracking identifier.
  3. Raw Article Storage — Original content is preserved for reference and reproducibility.
  4. Processing Trigger — The article is queued for automated analysis.

Normalization

  1. Text Parsing and Cleanup — HTML is stripped, content is converted to clean text, and metadata (source, date, URL) is preserved.
  2. Entity Extraction Pipeline — LLMs and pattern matchers identify candidate entities across the text.
  3. Normalization and Confidence Scoring — Extracted entities are validated, deduplicated, and assigned confidence levels (high, medium, low).

Analysis Branches

The analysis layer processes five extraction branches in parallel:

Branch Input Output Key Details
IOC Detection and Enrichment Normalized text IPs, domains, URLs, hashes, emails Regex + LLM hybrid; whitelisting filters benign infrastructure
TTP Extraction and ATT&CK Mapping Report behaviors Technique IDs, tactics, confidence Behavioral analysis, not keyword matching
CVE Extraction with Risk Context Vulnerability mentions CVE IDs with CVSS, exploit status, patch/PoC Cross-referenced with enrichment sources
Threat Actor and Malware Extraction Attribution context Named groups, malware families, tools Contextual extraction preserving relationships
Summary and Mindmap Synthesis Full report content AI summary, visual mindmap, 5W analysis Concise analytical artifacts for rapid triage

STIX 2.1 Structuring

The backend assembles all extraction outputs — IOCs, CVEs, TTPs, actors, and malware — into a unified STIX 2.1 bundle:

  1. STIX Relationship Generation — Semantic relationships (uses, indicates, attributed-to, exploits) are created between extracted objects.
  2. STIX Bundle Assembly and Validation — Objects are assembled into a STIX 2.1 bundle, validated against the JSON Schema and pattern syntax.
  3. Structured Storage and Retrieval API — Bundles and artifacts are stored and made available via the web interface, MCP tools, and REST API.

Per-Article Frontend Experience

For each processed article, the analyst frontend presents a comprehensive analysis through a tabbed interface:

Header Metadata

Every article page displays: title, source, publication date, link to original report, bookmark, and PDF export.

Analysis Tabs

Tab Description
Intel Graph Interactive STIX relationship graph with graph view and JSON view. Displays object count and provides STIX bundle download.
Diamond Model Diamond Model visualization mapping adversary, capability, infrastructure, and victim.
AI Summary AI-generated technical summary of the report.
TI Mindmap Interactive mindmap connecting threat actors, campaigns, malware, TTPs, IOCs, and targeted sectors.
IOCs Advanced IOC table showing only high and medium confidence indicators, with JSON export. Low-confidence IOCs remain available in the downloadable file.
CVEs Vulnerability details including CVSS severity, exploited/patch/PoC status, affected products, and correlated references.
TTP Catalog Complete catalog of MITRE ATT&CK techniques identified in the report.
Attack Flow Probable attack execution sequence reconstructed from the report.
5W Context Structured root-cause analysis (Who, What, When, Where, Why).
ATT&CK Heatmap Visual heatmap of mapped ATT&CK techniques across tactics.
Source Report Original report content for reference and verification.

Data Model

The primary structured output is a STIX 2.1 bundle containing:

  • Report — Container linking all intelligence from a single source
  • Threat Actor — Named threat groups or individuals
  • Malware — Malware families and tools
  • Indicator — IOCs with STIX patterns (IPs, domains, hashes)
  • Attack Pattern — MITRE ATT&CK techniques
  • Vulnerability — CVE identifiers with risk context
  • Relationship — Connections between the above objects

For detailed object specifications and examples, see STIX 2.1 Data Model.


Design Principles

  • Transparency — All limitations are documented openly. See Known Limitations.
  • Interoperability — STIX 2.1 enables integration with any compliant SIEM, SOAR, or TIP.
  • Verification first — Outputs are research-grade and require human review before operational use.
  • Open research — Methodology and evaluation results are published for peer review.

In This Section