An open ecosystem for structural observation of adversary activity - where what's observed is shared, what's shared is queried, and what's queried becomes detection.
A C2 domain gets burned, rotated, replaced. By the time an IOC lands in a feed, the adversary has already moved. Half-life measured in hours.
The pattern behind the artifact - entry → staging → payload → C2 - survives rotation. The actor's choices behind the pattern - registrar, hosting tier, op-hours - survive even longer. Same actor, same shape, same decisions, different values.
Seven components, one substrate. Every observation flows through the same cycle - and every cycle feeds the next.
The graph where every artifact, every session, every observation, every match eventually lands. Persistent across time, structured by design.
The structural vocabulary for what the actor built. Five roles, 26 techniques, typed relations. JSON-schema-validated. Federated as versioned pattern feeds.
The twin layer to IIM. Where IIM tracks how infrastructure is built, Modus tracks the choices the actor makes when they build it. The fingerprint that survives even when the infrastructure rotates.
When you have thousands of chains, patterns, and actor profiles - yours plus federated feeds - the interesting questions are structural. IIMQL turns them into one-liners.
The "what to work on next" layer that sits on top of everything else. Actor-centric defensive prioritization - transparent, contestable, driven by the actor profile Modus produces.
Federated YARA. Rules versioned, signed, distributed. When a rule fires, the sample can come back for analysis - closing the loop between detection and observation.
A trustworthy European sandbox. On-prem for organizations that need air-gap. Public EU instance for those that need data sovereignty. No current major sandbox meets both bars.
A sample in, structured observation out. Every format the researcher actually sees - not just PEs, not just executables.
IIM describes infrastructure · Modus describes the actor · everything else is built around them - and everything flows back to Kraken.
Malwarebox fills the researcher-workbench layer that sits before the intel store. Everything else stays as it is.