Israel Government Threat Actors CTI
This documentation organizes public-source threat intelligence for defensive use by Israeli government and public-sector defenders.
CTI Ecosystem
This knowledge base is the Israel-focused actor and sector layer of a three-book CTI ecosystem. Use CTI Project Ecosystem to navigate between the books.
- CTI Analyst Field Manual provides general CTI tradecraft for evidence, attribution, infrastructure pivoting, and CTI-to-detection work.
- Customer-Driven AI CTI Project provides the gated delivery methodology for turning this intelligence into customer-ready outcomes.
Reading Order
- Threat Model
- Source Rating
- Actor Index
- Actor Navigation Workbench
- TTP To Detection Matrix
- Surface And Capability Matrix
- Connected TIPs And CTI Feeds
- VirusTotal Malware Enrichment
- Intelligence Update Queue
- Report Index
- CTI-to-Detection Operating Standard
- Threat Hunting Workflow
- Detection Lifecycle
- Scored source library in
sources/ - Detection examples in
detections/sigma/anddetections/kql/
Operating Rules
- Analysts MUST distinguish source facts from analytic inference.
- Analysts SHOULD cite at least one source record for every actor claim.
- Detections MUST be validated against local telemetry before production deployment.
- IOC matches SHOULD be treated as leads, not final attribution.
- Threat hunts SHOULD start from a PIR, scenario, and evidence record.
- Production coverage MUST NOT be claimed below DRL-9.