Outputs¶
TI Mindmap HUB generates several structured outputs from each processed threat intelligence report. This section documents each output type, its format, and how to consume it.
Output Types¶
| Output | Format | Description |
|---|---|---|
| Interactive Mindmaps | Mermaid / Markdown | Visual threat models connecting actors, campaigns, malware, TTPs, and IOCs |
| STIX 2.1 Bundles | JSON | Standardized threat intelligence packages with semantic relationship graphs |
| IOC Extraction | JSON | Indicators of Compromise — IPs, domains, hashes, URLs, emails |
| CVE Intelligence | JSON | Vulnerability identifiers with enrichment and cross-report correlation |
| MITRE ATT&CK Mapping | Table / JSON | Behavioral technique and tactic mapping from report content |
| Weekly Briefings | Markdown / HTML | Trend-focused weekly threat landscape synthesis from 50–60 reports |
Common Characteristics¶
All outputs share these properties:
- AI-generated — Produced by LLM processing; requires human verification
- Source-linked — Every output references the original report URL
- Timestamped — Creation and modification dates are preserved
- Downloadable — Available through the web interface and API
- Structured — Designed to be machine-readable and reusable beyond the UI
Warning
All outputs are experimental and for informational purposes only. Verify indicators against original sources before operational use.
Access Methods¶
- Web interface — Browse and download from ti-mindmap-hub.com
- MCP tools — Query programmatically via MCP integration
- API — Retrieve STIX bundles and content types via authenticated API calls