4 Documentation Sites · 11 Repositories · 36 Articles

Threat Intelligence Research

Actor profiles, tradecraft methodology, detection engineering, threat hunting, and sector intelligence. Structured repositories with evidence labels, confidence tiering, and detection-ready outputs. Published across Medium, GitHub, and three Docusaurus documentation sites.

Documentation Sites

4 Docusaurus sites

Docusaurus · Published

Operation Desert Hydra

Full AI-assisted CTI pipeline documentation: source gathering with review gate, procedure dataset, OpenCTI knowledge graph, detection atlas (11 detections with pseudologic and proof screenshots), validation lab architecture, coverage matrix, and production scars. One-command reproducible lab.

Docusaurus · Published

CTI Analyst Field Manual

Practitioner operating manual covering the full CTI-to-detection chain. Evidence labels, source reliability, confidence language, attribution methodology, infrastructure pivoting, AI-assisted workflows, and detection candidate mapping. 80+ pages across 10 modules. Readiness score 8.8/10.

Docusaurus · Published

Customer-Driven AI CTI Project

End-to-end methodology for delivering structured CTI engagements with AI assistance. Scoping, collection, analysis, and delivery phases. Human validation gates throughout. Includes Phase 1 Foundations, Phase 2A Execution Guide, and Phase 2B Reference Toolkit.

Docusaurus · Published

Israel Government Threat Actors CTI

Blue-team defensive CTI repository: public-source reporting on threat actors, personas, malware families, TTPs, and detection opportunities relevant to Israeli government, public-sector, critical infrastructure, and adjacent suppliers. Iranian, Palestinian, and regional activity clusters with ATT&CK mappings.

Git Repositories

11 repos
operation-desert-hydra
MuddyWater Elastic OpenCTI

AI-assisted CTI pipeline: 8 promoted public sources → OpenCTI 6.2 knowledge graph → 11 ATT&CK-mapped detection rules → Ansible-validated Kibana screenshots. Sysmon + Winlogbeat on Vagrant Windows 10 VM. Docusaurus documentation site. One-command deploy: bash start.sh.

CTI
reports evidence

Evidence-labeled cyber threat intelligence reports built for analysts, SOC leads, and detection engineers. Each report carries explicit confidence discipline — what is Observed, Reported, Assessed, or Inferred. Outputs: PDF reports, pivoting notes, detection candidates.

CTI Detection Pack
detection Sigma YARA

Detection artifacts derived from CTI reports, malware-analysis output, and threat-hunting articles. Explicit report → hypothesis → detection → validation handoff. Includes Sigma rules, YARA signatures, ATT&CK Navigator layers, IOC sets, and hunt queries.

CTI Enrichment Tool
Python VirusTotal Neo4j

Modular pipeline: extract public IPs from logs → enrich with VirusTotal → compute deterministic risk scores → build entity graph → load into Neo4j → run graph queries. Config-driven, per-step JSON outputs. Optional in-memory graph and browser visualization.

CTI MCP Server
MCP Claude 15-phase

Model Context Protocol server implementing a 15-phase CTI production cycle inside Claude. Human validation gates after every phase; formal quality-gate sign-off at six milestones. Claude cannot silently advance the workflow — each phase returns a STOP + analyst checklist. Integrates VirusTotal and MISP.

CTI in the AI Era
learning path FOR578-derived

Complete CTI learning path derived from FOR578 structure and adapted for modern AI-assisted workflows. Weekly schedule, capstone guide, and original instructional material. Does not redistribute SANS courseware — designed to complement licensed study.

Threat Hunting Hypotheses
hunting KQL Splunk

Structured hunting hypotheses extracted from CTI and threat-hunting research. Each hypothesis carries data sources, query logic (Splunk SPL + KQL), false-positive notes, and ATT&CK technique mapping.

Cloud Identity Kill Chain
cloud SaaS detection

Reproducible detection engineering research for cloud identity and SaaS intrusions. Uses fully synthetic telemetry — no real tenants, tokens, or users. Each scenario: problem → real-world CTI evidence (Mandiant, IBM X-Force, Unit 42, CISA) → synthetic lab scenario + detection rules.

Israel Gov. Threat Actors CTI
threat actors blue team

Source repository for the deployed Docusaurus site. Actor and persona profiles, ATT&CK mappings, IOC reference locations, and detection examples. Intentionally blue-team only — no binaries, leaked data, or exploit code. GitHub Actions CI validates links and structure.

Customer-Driven AI CTI Project
Docusaurus methodology

Source repository for the Customer-Driven AI CTI Project Docusaurus site. Contains the full methodology, article series content, and cross-links to the CTI Analyst Field Manual. Published entry point: Medium series overview + Docusaurus documentation site.

CTI Analyst Field Manual
Docusaurus 80+ pages

Source repository for the CTI Analyst Field Manual Docusaurus site. 80 source markdown files across 10 modules: foundations, analytic discipline, frameworks, attribution, infrastructure pivoting, actor research, sector CTI, CTI-to-detection, AI-assisted CTI, and templates. CI: GitHub Actions link check + build.

Actor Research & Profiles

5 articles
CTI Research: Handala Hack Group

Full actor profile — aliases, attribution, claimed operations, TTPs, malware families, and detection opportunities for the Handala Hack Team hacktivist cluster.

hacktivistIran-linkedIsrael-targeting
CTI Research: Sandworm / APT44

Profile of Sandworm (APT44 / FROZENBARENTS): destructive operations, wiper malware families, ICS/OT targeting, and Ukraine conflict-related activity.

Russia-stateGRUdestructive
CTI Research: MuddyWater / Seedworm (Mango Sandstorm)

Profile of MuddyWater: MOIS-linked actor, RMM tool abuse, spear-phishing tradecraft, persistent access methodology, and detection candidates.

Iran-stateMOISMiddle East
CTI Research: Kubernetes & Cloud-Native Threat Landscape

Structured threat landscape assessment for container and Kubernetes environments: tracked actor activity, common TTPs, and detection priorities.

cloudKubernetesthreat landscape
APT41 Targeting Pharmaceutical Sector: Log4Shell to Domain Compromise

CTI report underpinning Operation DragonRx: APT41 initial access via Log4Shell, lateral movement to Active Directory, credential harvesting, and detection hypotheses.

APT41China-nexuspharma

CTI Tradecraft & Methodology

8 articles
CTI Analyst Field Manual — Complete Reference

Full tradecraft reference: evidence labeling, source reliability, confidence tiering, attribution methodology, infrastructure pivoting, and detection candidate mapping.

tradecraftfield manual
CTI Kill Chain: An Analyst Guide With Real-World Evidence

Applying kill chain analysis to real adversary behavior — evidence labeling at each stage with worked examples drawn from public reporting.

kill chaintradecraft
ATT&CK as a Working Tool: Theory and Hands-On Practical Usage

Moving beyond the matrix: technique selection, sub-technique context, ATT&CK Navigator usage, and detection hypothesis construction from real reports.

ATT&CKMITRE
Tools by MITRE ATT&CK Guide

Tool-to-technique mapping reference: which adversary tools map to which ATT&CK techniques, how to use this for detection prioritization.

ATT&CKtooling
Attribution Methodology: How to Build, Defend, and Challenge

Structured approach to attribution: evidence strength ladder, false-flag considerations, confidence levels, and how to defend attribution claims under scrutiny.

attributionmethodology
Infrastructure Pivoting: Single IOC to Full Attacker Network

Passive DNS, certificate transparency, ASN/hosting pivots, and JARM/JA3 fingerprinting — turning one IOC into a defensible infrastructure cluster.

pivotingpassive DNSIOC
Applying Sherman Kent's Analytic Discipline to CTI

Words of estimative probability, source critique, assumption tracking, and cognitive bias mitigation applied to practical CTI production.

analytic disciplineSherman Kent
Manual CTI vs. AI-Assisted CTI: Step-by-Step Clock Comparison

Side-by-side workflow timing: same CTI task completed manually vs. with AI assistance — where time is saved, where analyst judgment remains irreplaceable.

AIworkflow

Detection Engineering

7 articles
From Threat Intelligence to Detection: A Practitioner's Guide

End-to-end workflow: actor assessment → TTP extraction → detection candidate → hunting hypothesis → backlog item → production rule.

CTI-to-detectionworkflow
The Atomic Standard: Compendium for Single-Event Threat Detection

Practitioner reference for building and evaluating atomic detection rules — coverage gaps, noise thresholds, and the tradeoffs between specificity and recall.

detectionatomic rules
Single-Event Detection Rules in Cybersecurity

When and how to write single-event rules: signal strength requirements, false-positive budgets, and integration with correlation layers.

detectionrules
Correlation-Based Detection Rules: Atomic Events to Behavioral Insight

Stacking atomic signals into behavioral patterns — temporal windows, entity pivots, and MITRE ATT&CK tactic-level correlation logic.

detectioncorrelation
What AI-Assisted Offensive Work Means for Your Detection Program

Practitioner analysis: how AI-augmented offensive operations change attacker tempo, tradecraft diversity, and the assumptions underlying existing detection coverage.

AIdetection
Malicious Activity as a Statistical Signal: Anomaly-Based Detection

Framing detection as statistical inference — baseline construction, drift detection, and reducing false-positive rates in anomaly-based rules.

detectionanomaly
Detecting Malicious Insider Activity: Technical Detection Engineering Guide

Data source requirements, behavioral baselines, and detection logic for identifying malicious insider patterns across endpoint, identity, and data-access telemetry.

detectioninsider threat

Threat Hunting

3 articles
Threat Hunting with the Pyramid of Pain

Using the Pyramid of Pain to prioritize hunt targets — moving from hash-based detection toward behavioral and TTP-level hunting with practical examples.

pyramid of painhunting
Protocol-Level Network Threat Hunting: A Wireshark-Centric Guide

Wireshark-driven hunt methodology: protocol anomalies, C2 communication patterns, DNS tunneling indicators, and SSL/TLS fingerprinting in captured traffic.

networkWiresharkhunting
Endpoint Threat Hunting: Windows, Linux, and macOS

Platform-specific hunt playbooks: process genealogy analysis, persistence mechanism review, and lateral movement artifacts across Windows, Linux, and macOS endpoints.

endpointWindowsLinux

Threat Landscape & Sector Intelligence

6 articles
Cyberattacks on 4G/LTE Telecom Networks: Threat Mapping and Defense

Protocol-level threat mapping for 4G/LTE infrastructure: GTP exploitation, SS7 abuse, and defensive controls for cellular network operators.

telecom4G/LTE
Cyberattacks on 5G Telecom Networks: Threat Mapping and Defense

5G-specific threat landscape: network slicing attacks, SBA exposure, O-RAN security considerations, and detection priorities for 5G operators.

telecom5G
CTI-Led Defensive Strategy for a Cellular Provider: Case Study

Applied case study: translating telecom threat intelligence into a prioritized defensive roadmap for a cellular provider — from threat model to detection backlog.

telecomcase study
Cloud-Native Security Threats, Attacks, and Detection Strategies

Container and Kubernetes threat landscape: supply chain risks, runtime attacks, lateral movement in ephemeral environments, and cloud-native detection approaches.

cloudKubernetesthreat landscape
AI in Offensive Operations: How Threat Actors Use AI

Evidence-based assessment of AI adoption in offensive tradecraft: phishing automation, malware generation, reconnaissance acceleration, and the detection implications.

AI threatsoffense
AI Offensive Security: Practical Attacks Against LLM Agents

Prompt injection, data exfiltration via LLM agents, tool-call manipulation, and the emerging attack surface introduced by agentic AI deployments.

LLM securityAI attacks

Operation Desert Hydra

MuddyWater CTI pipeline · 1 article · 1 site · 1 repo
Operation Desert Hydra — AI-Assisted CTI Pipeline: MuddyWater to Kibana

Full end-to-end pipeline: 8 promoted public sources on MuddyWater (Iranian MOIS) → AI-deduplicated source register (71 → 8) → OpenCTI 6.2 knowledge graph → 11 ATT&CK-mapped detection rules → Ansible-validated Kibana proof screenshots. 13 PASS / 1 PARTIAL / 1 FAIL across 16 rule checks.

CTI pipelinedetection engineeringAI-assistedMuddyWater
Operation Desert Hydra — Docusaurus Documentation Site

Full pipeline documentation: Phase 1 source gathering with review gate, Phase 2 procedure dataset, Phase 3 OpenCTI graph, Phase 4 detection atlas (all 11 detections with pseudologic), Phase 5 validation lab with lab architecture, Phase 6 coverage matrix, and production scars.

CTI-to-detectionOpenCTIKibana
operation-desert-hydra
MuddyWater Elastic OpenCTI

AI-assisted CTI pipeline — public-source MuddyWater intelligence through OpenCTI knowledge graph to 11 validated Kibana detections. Vagrant Windows 10 VM + Ansible + Sysmon + Winlogbeat. One-command reproducible lab: bash start.sh.

Operation DragonRx

APT41 simulation · 2 articles · 1 repo
Lab Architecture — Operation DragonRx

Infrastructure design for the APT41 simulation: target network topology, Sliver C2 setup, Wazuh + Zeek + Elastic detection stack, and isolation controls.

APT41labarchitecture
Attack Playbook — Operation DragonRx

Step-by-step attack execution: Log4Shell initial access → Sliver C2 implant → AD lateral movement → LSASS dump → detection trigger analysis.

APT41playbookLog4Shell
dragonrx-lab
APT41 Log4Shell Wazuh

Full-stack APT41 pharmaceutical-sector simulation lab. Log4Shell (CVE-2021-44228) initial access, Sliver C2, Active Directory lateral movement, LSASS credential dump, dual detection layer with Wazuh + Zeek + Elastic. Includes attack playbook and CTI report.

Customer-Driven AI CTI Project Series

4 articles
Customer-Driven AI CTI Project — Overview

Introduction to the methodology: what a structured client-facing CTI engagement looks like, and how AI tooling fits inside a controlled analyst workflow.

AICTI methodology
Customer-Driven AI CTI Project Template — Part 1: Foundations

Project charter, scope definition, stakeholder requirements, and the evidence and confidence framework that governs the entire engagement.

AIfoundations
Customer-Driven AI CTI Project Template — Part 2A: Execution Guide

Phase-by-phase walkthrough: collection, enrichment, analysis, and reporting with explicit human validation checkpoints at each stage.

AIexecution
Customer-Driven AI CTI Project Template — Part 2B: Reference Toolkit

Templates, prompt library, quality gates, output artifact formats, and the cross-reference map tying the methodology to the CTI Analyst Field Manual.

AItemplatestoolkit