diff --git a/user-stories/README.md b/user-stories/README.md
index 17dad86..f41eb28 100644
--- a/user-stories/README.md
+++ b/user-stories/README.md
@@ -4,7 +4,7 @@
|-|-|
| As a lead threat intelligence analyst, I want to lead a team focused on hunting down threats so that I can prevent attacks against ICT infrastructures and organizations |
- Monitor what teams are up to in real-time using the Live Dashboard
|
| As a threat analyst, I want to research, analyze and reverse engineer malware so that I can know how to counter it | - Attach and download files and malware samples from events
- Search for hashes/IPs/domains/URLs from malware events, or add malware samples hashes to an event
- Analyse observables and malware collected during an incident (e.g. domain name, IP addresses etc.) by checking whether observables are IoCs or false positives using ‘correlation graph’ and ‘expansion modules’.
- Enrich malware events by querying data sources external to MISP using modules
- Perform dynamic malware analysis correlations
- Submit events with malware samples to analysis tools (e.g VirusTotal, VMRay) for further analysis, and then extend MISP with malware analysis results
|
-| As a lead threat intelligence analyst, I want to convert threat data into actionable threat intelligence so that I can improve security posture. | - Import data from external sources
- Add feeds
- Contextualise events and attributes using tags, taxonomies and galaxies
|
+| As a lead threat intelligence analyst, I want to convert threat data into actionable threat intelligence so that I can improve security posture. | - Import data from external sources
- Add feeds
- Contextualise events and attributes using tags, taxonomies and galaxies
|
| As a threat analyst, I want to exchange threat information with third parties so that we can gain shared situational awareness | - Setup different models of distribution on MISP instance
- Sync events and attributes between instances
- Use filtering functionalities to meet an organisation's sharing policy
- Share information, pentest information, malware samples, vulnerabilities internally and externally
- Use feature/achievements widget adding gamification to the information sharing
|
| As a threat analyst, I want to monitor threats and access live data so that I can manage threats before they cause major damage | - Import lists of indicators and check if the IOCs are present in feeds.
- Monitor statistics and sightings using widgets
- Show live data and stats from one or more MISP instances via the Dashboard
- Process information in real-time when it's updated, created, or published by instances by integrating with ZMQ
- Use sightings to notify an instance about activities related to an indicator
|
| As a threat analyst, I want to aggregate and compare indicators from various sources so that I can connect the dots between various threats | - Join communities and subscribe to the feeds
- Add events and assign events to specific feeds
- Correlate indicators using MISP's automated correlation engine
- Use the overlap feed analysis available in MISP
- Link events and attributes using the correlation graph
- Analyse and gain more information on attributes using modules
- Link events with malware, threat actors etc using galaxies (e.g ATT&CK)
|