01Automated activity thread generation using chronological graph analysis
02Pivot point identification to discover shared threat actor infrastructure and techniques
03Programmatic event classification for Adversary, Capability, Infrastructure, and Victim features
04Graph-based visualization of intrusion relationships and activity-attack graphs
05Standardized data structures compatible with STIX 2.1 and MITRE ATT&CK mapping
064,120 GitHub stars