II.
LibraryProcess JSON
Structured · livelib-process:security-research--threat-intelligence-research
threat-intelligence-research json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "lib-process:security-research--threat-intelligence-research",
"_kind": "LibraryProcess",
"_file": "generated-library/processes.yaml",
"_cluster": "generated-library",
"attributes": {
"displayName": "threat-intelligence-research",
"description": "Collection and analysis of threat intelligence including APT tracking, malware campaigns,\nTTPs analysis, and IOC generation. Produces actionable intelligence for defensive operations using\nMITRE ATT&CK mapping and STIX/TAXII standards.",
"libraryPath": "library/specializations/security-research/threat-intelligence-research.js",
"specialization": "security-research",
"references": [
"- MITRE ATT&CK: https://attack.mitre.org/\n- STIX: https://oasis-open.github.io/cti-documentation/stix/intro"
],
"example": "const result = await orchestrate('specializations/security-research/threat-intelligence-research', {\n projectName: 'APT29 Campaign Analysis',\n researchFocus: 'apt-tracking',\n sources: ['osint', 'malware-samples', 'incident-reports']\n});",
"usesAgents": [
"threat-intel-analyst"
]
},
"outgoingEdges": [
{
"from": "lib-process:security-research--threat-intelligence-research",
"to": "domain:cybersecurity",
"kind": "lib_applies_to_domain",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--threat-intelligence-research",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--threat-intelligence-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--threat-intelligence-research",
"to": "lib-agent:security-research--threat-intel-analyst",
"kind": "uses_agent",
"attributes": {
"weight": 0.8
}
}
],
"incomingEdges": []
}