Skip to content

Sab0x1D/sigtrack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

sigtrack

IOC & Signature Tracker
A curated repository for mapping and organizing threat detection signatures and indicators.
Map Index


Purpose

  • YARA Rules — Context mapping, rule-to-IOC alignment, and signature families
  • Sigma Rules — SIEM-based behavioral detection
  • IOC Mapping — IPs, hashes, C2s, mutexes, registry paths, and more
  • Cross-linked with ghostyara rules

Organized for red/blue/purple teams, SOC automation, CTI workflows, and malware tracebacks.


Folder Structure

Folder Description
./yara_map/ Cross-linked indicators and behaviors per YARA rule/family
./sigma/ Sigma rules for log-based detection (e.g., Windows Event Log)
./ioc/ IOC sets, threat mappings, and ATT&CK-aligned technique notes

Use Cases

  • CTI analysts mapping adversary infrastructure and TTP chains
  • Threat hunters organizing coverage across detection layers
  • SOC teams cross-validating sandbox/EDR results
  • Signature developers maintaining indicator-to-rule traceability

Repo Interoperability

This repo supports and extends:

  • ghostyara — housing YARA detection rules
  • Your broader threat intel or detection engineering pipeline

Contributing

PRs welcome with the following:

  • Verified indicators or sandbox references
  • MITRE-aligned mappings
  • Clean formatting and naming (prefer lowercase, kebab-case for files)

Map Index

About

IOC & signature tracker — Sigma, YARA, and threat mappings

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published