threatintel
actor tracker
detection rules · 25 (13 sigma, 6 yara, 6 suricata)

Detection rules for tracked tradecraft

Each rule maps to one or more ATT&CK techniques used by actors in this catalog. The YAML / YAR / .rules files under detections/ are the canonical artifacts and the intended consumption path (clone the repo, run pySigma / sigmac for Sigma, the yara CLI for YARA, and suricata for the network-layer rules). This page is the discoverability surface — click any rule to inline its source.

Status: experimental. Treat each rule as a starting point and tune false-positives for your environment.

Level