Assuming your application can federate with AD FS, then you will need to do something on app side and on AD FS side.
On AD FS you will create a relying party trust. On app side you need to configure it to trust tokens issued by AD FS.
You don't need to create an STS as AD FS is the STS here. Metadata is always published at a URL like https://sts.contoso.com/federationmetadata/2007-06/federationmetadata.xml where the server name (sts.contoso.com) used for the AD FS varies.
Issuer is the identifier string and by default would be http://sts.contoso.com/adfs/services/trust in this case. You can see it in federation service properties within AD FS management console or in get-adfsproperties cmdlet output. You can also change it to another URI if you want.
The logon page is provided if you are doing FBA at AD FS. Else you may get a prompt to do Windows Integrated Auth.
It looks like you need to read a lot about AD FS functionality and usage. I don't think the question/answer is a good way to educate yourself about how to do everything in AD FS.
As you are using AD FS 2.x you should review information at http://social.technet.microsoft.com/wiki/contents/articles/2735.ad-fs-content-map.aspx
See https://msdn.microsoft.com/en-us/library/hh545401(v=vs.110).aspx for details of customising ASP.Net app to use WS-Federation.
http://www.cloudidentity.com/blog/2014/04/29/use-the-owin-security-components-in-asp-net-to-implement-web-sign-on-with-adfs/ is also good to see how to use OWIN with the newer version of AD FS on Windows Server 2012 R2. The instructions are perfectly usable with AD FS 2.x so you might prefer to use OWIN instead of WIF.