From Report to Structured Intelligence¶
This tutorial walks through the process of going from a raw threat report to structured, actionable intelligence using TI Mindmap HUB.
Prerequisites¶
- A TI Mindmap HUB account at ti-mindmap-hub.com
- A publicly accessible threat intelligence report URL
Step 1: Submit a Report¶
You can submit a report URL in two ways:
- Log in to ti-mindmap-hub.com
- Navigate to the submission form
- Paste the report URL
- Click Submit
Step 2: Wait for Processing¶
The platform processes the report through its six-stage pipeline:
- Content acquisition and cleaning
- AI-powered analysis
- IOC extraction
- TTP mapping
- STIX 2.1 generation
- Storage and indexing
Processing typically completes within a few minutes.
Step 3: Review the Summary¶
Once processing completes, the report page shows:
- Technical summary — A concise AI-generated overview
- Visual mindmap — Key relationships in diagram form
- Five Whats — Structured root-cause analysis
These provide a quick understanding of the report's content without reading the full original article.
Step 4: Examine Extracted IOCs¶
Navigate to the IOCs tab to see extracted indicators:
- IP addresses, domains, and URLs
- File hashes (MD5, SHA-1, SHA-256)
- CVE identifiers
- Email addresses
Verify Before Blocking
Always validate extracted IOCs against the original source before adding them to blocklists or detection rules.
Step 5: Review MITRE ATT&CK Mappings¶
The TTPs tab shows which MITRE ATT&CK techniques were identified:
- Technique ID and name
- Associated tactic (kill-chain phase)
- Execution sequence (probable attack flow)
Use these mappings to check your coverage against the described attack.
Step 6: Download the STIX Bundle¶
The STIX tab provides the complete STIX 2.1 bundle for import into your security tools:
- Click Download STIX Bundle
- Import into your SIEM, SOAR, or TIP (see STIX Platform Integration)
- Review the imported objects and relationships
Step 7: Cross-Reference with Existing Intelligence¶
For best results:
- Compare extracted IOCs with your existing threat feeds
- Check whether mapped TTPs align with known adversary profiles
- Use the weekly briefing to understand broader trends
Next Steps¶
- Outputs — Detailed documentation of each output type
- MCP Integration — Automate queries with AI assistants
- Known Limitations — Understand what to verify