diff --git a/user-stories/README.md b/user-stories/README.md
index 1a9375a..17dad86 100644
--- a/user-stories/README.md
+++ b/user-stories/README.md
@@ -7,7 +7,7 @@
| As a lead threat intelligence analyst, I want to convert threat data into actionable threat intelligence so that I can improve security posture. |
- Import data from external sources
- Add feeds
- Contextualise events and attributes using tags, taxonomies and galaxies
|
| As a threat analyst, I want to exchange threat information with third parties so that we can gain shared situational awareness | - Setup different models of distribution on MISP instance
- Sync events and attributes between instances
- Use filtering functionalities to meet an organisation's sharing policy
- Share information, pentest information, malware samples, vulnerabilities internally and externally
- Use feature/achievements widget adding gamification to the information sharing
|
| As a threat analyst, I want to monitor threats and access live data so that I can manage threats before they cause major damage | - Import lists of indicators and check if the IOCs are present in feeds.
- Monitor statistics and sightings using widgets
- Show live data and stats from one or more MISP instances via the Dashboard
- Process information in real-time when it's updated, created, or published by instances by integrating with ZMQ
- Use sightings to notify an instance about activities related to an indicator
|
-| As a threat analyst, I want to aggregate and compare indicators from various sources so that I can connect the dots between various threats | - Join communities and subscribe to the feeds
- Add events and assign events to specific feeds
- Correlate indicators using MISP's automated correlation engine
- Link events and attributes using the correlation graph
- Analyse and gain more information on attributes using modules
- Link events with malware, threat actors etc using galaxies (e.g ATT&CK)
|
+| As a threat analyst, I want to aggregate and compare indicators from various sources so that I can connect the dots between various threats | - Join communities and subscribe to the feeds
- Add events and assign events to specific feeds
- Correlate indicators using MISP's automated correlation engine
- Use the overlap feed analysis available in MISP
- Link events and attributes using the correlation graph
- Analyse and gain more information on attributes using modules
- Link events with malware, threat actors etc using galaxies (e.g ATT&CK)
|
| As a threat analyst, I want to have a structured database of threat data that I can use to perform lookups/queries when investigating new threats | - Store information in a structured format using STIX
- Import unstructured reports using the free-text import tool
- Use MISP as a centralized hub for security and fraud threat intel. Centralize threat intel by aggregating indicators from OSINT and commercial feeds
- Remove false positives and duplicates
- Score indicators based on Sightings and other metrics
Import/integrate feeds or threat intelligence from third parties Generate, select, exchange, and collect intelligence using feeds - Select and import events
- Look for correlations between events using the correlation graph
- Build filtered subsets of the data repository for feed creation.
- Preview and correlate feed data directly for evaluation
|
| As a threat analyst, I want to contextualize and enrich raw threat data so that I can produce actionable intelligence | - Understand attacker TTPs by using taxonomies to link events
- Categorize risks and incidents using galaxies and taxonomies
- Quickly classify information using tags collections
- Contextualise sightings with information on the source
- Enrich IDSes export with tags to fit your NIDS deployment
- Decay attributes and score indicators using sightings (reported by IDSes)
- Describe and visualise complex scenarios using MISP's richer data structure
- Allow advanced combination of attributes using MISP objects
|
| As a threat analyst, I want to investigate threats so that I can protect computer systems from attacks | - Find relevant data for investigations from MISP communities. Preview new MISP events and alerts from multiple sources such as email reports, CTI providers, and SIEMs
- Query a MISP instance for events that include a given IOC. Browse through other MISP events, attributes, objects, tags, and galaxies
- Create events, add IoCs (attributes), and contextualise (using tags)
- Pivot an event into its attributes, objects, tags, galaxies, and/or related Events
- Explore further details from Galaxies and related Events
- Categorize available related information within the ATT&CK framework.
- Query tools (e.g Cytomic Orion API) to check if certain MISP indicators have been observed, and the import sighting details to add them to MISP events
- Prioritize threats using Sightings collected from users, scripts and IDSes.
- Decay/expire indicators using sightings reported by users, scripts and IDSes
- Launch lookups from MISP against SIEMs as part of an investigation
- Correlate network forensic flows from several tools
|