This repository contains SIEM rules to aid in detecting the tactics, techniques, and procedures (TTPs) used by various threat actors.
Want to stay in the loop? Subscribe to be notified for new Microsoft Sentinel content from ReversingLabs: https://www.reversinglabs.com/threat-intel-weekly-newsletter-sign-up
Each group will have the following subdirectories containing detection rules and other useful resources:
This folder contains Sigma rules that can be used to detect threat actor TTPs.
This folder contains KQL queries that can be used to identify threat actor TTPs in Microsoft Sentinel and Microsoft Defender for Endpoint. Use these queries to hunt for threats, or create analytic rules to generate alerts and incidents.
This optional folder contains related YARA rules that can be used to identify malware.
This project is licensed under the MIT License - see the LICENSE file for details.