Hey if you’re one of the countless awesome folks spending your free time to understand and document threat actors or their TTPs - if you want to maximize making your work actionable for blue teams and repeatable/consistent over time, consider cloning #OpenTIDE and using it to publish your research as standardized objects! #BuildOnce
This is pretty good on why you should test your detections and options/deliberations to go through when you're considering doing it:
https://medium.com/anton-on-security/testing-in-detection-engineering-part-8-73516197d5b4
We added a short #OpenTIDE release blog with basic info, how to use it and for what and with an attempt to describe the roadmap for the tool.