Home Threat Hunting Basics
Post
Cancel

Threat Hunting Basics

Threat Hunting Basics

Threat hunting is the proactive practice of searching for hidden threats or malicious activity within an organization’s environment, before or after alerts are triggered. Its main goal is to uncover attacks early, reducing the dwell time, which is the period an adversary remains undetected in the network.

Dwell time refers to the period an attacker remains undetected in your environment. Minimizing dwell time is critical because even a few hours of undetected activity can lead to stolen credentials, lateral movement, and data exfiltration.

Why Traditional Security Tools Fall Short

While AV and EDR solutions are valuable, they inherently rely on predefined detection rules such as known file hashes, signatures, or behavioral indicators. These tools are excellent at catching known threats but often fail against:

  • Zero day malware that has never been seen before
  • Advanced Persistent Threats (APT) employing novel techniques
  • Insider threats or misconfigurations that behave like legitimate activity

Traditional security tools are fundamentally reactive. If a malicious action does not match a signature or known behavior, it can easily go unnoticed. Threat hunting fills this gap, enabling security teams to actively search for anomalies, uncover stealthy attacks, and improve detection over time.

The Value of Threat Hunting

Threat hunting goes beyond simply finding malware or malicious IPs. It allows security teams to uncover critical weaknesses that may otherwise remain hidden, such as:

  • Misconfigured devices that could be exploited
  • Unpatched software on critical servers
  • Unauthorized or suspicious software installations
  • Evidence of privilege escalation or unauthorized account activity

In addition to immediate detection, hunting provides insights that improve overall security posture. Every hunt refines detection rules, enhances log collection practices, and informs proactive risk mitigation strategies.

When Should You Hunt?

Threat hunting can be initiated in multiple scenarios. Some hunts are scheduled periodically to ensure no anomalies go unnoticed, while others are reactive to intelligence or internal alerts. Common triggers include:

  • Routine proactive hunts within organizations that maintain dedicated hunting teams
  • New threat intelligence indicating emerging attacks targeting your sector
  • SOC or IR alerts highlighting suspicious activity that requires deeper investigation
  • Findings from previous hunts, where anomalies were identified but not fully investigated
  • Post-risk assessment validation, focusing on high value systems or sensitive data

Effectively, threat hunting is both a strategic and tactical process, balancing routine assessments with intelligence driven investigations.

The Threat Hunting Lifecycle

A successful threat hunt follows a defined lifecycle, which ensures both structure and repeatability:

  1. Trigger: Define why the hunt is happening. This usually takes the form of a hypothesis, informed by intelligence, risk assessments, or anomalies.
  2. Investigation: Dive into internal telemetry collect logs, analyze network traffic, and validate the hypothesis against real world data.
  3. Resolution: Conclude the hunt by documenting findings, feeding insights into SIEM rules, and updating playbooks for future hunts. Post hunt analysis often leads to new hypotheses and detection improvements.

Types of Threat Hunts

Threat hunting is not one-size-fits-all. Different hunts focus on different sources of intelligence and methodologies:

Structured Hunts

Structured hunts focus on known adversary TTPs (Tactics, Techniques, Procedures), often derived from frameworks like MITRE ATT&CK. Instead of searching for specific indicators, structured hunts focus on behavioral patterns that attackers are likely to use. For example, a hunter might look for evidence of lateral movement or persistence techniques even if no known malware is detected.

Unstructured Hunts

Unstructured hunts are typically IOC driven, beginning with indicators of compromise obtained from threat intelligence, previous incidents, or alerts from SOC/IR teams. These hunts involve searching logs and telemetry for any activity that matches these known indicators, and can reveal early stage intrusions or stealthy activity.

Situational Hunts

Situational hunts target high value systems or assets identified as high risk. For example, a public facing customer portal with sensitive data may be the focus. Hunters analyze deviations from expected behavior, such as unusual login patterns, access from unexpected geolocations, or abnormal file access.

The Pyramid of Pain

The Pyramid of Pain is a concept that helps hunters prioritize the value of indicators:

Indicator TypeHunting Impact
Hash ValuesEasy to detect, but attackers can easily change them
IP AddressesModerately valuable; attackers can rotate IPs
Domain NamesHarder to change; requires registration and hosting effort
Network/Host ArtifactsAttacker must modify tactics or infrastructure; valuable detection points
ToolsDisrupts adversary operations; forces new tools or methods
TTPsMost valuable; behavior based detection forces attackers to change techniques

Focusing on TTPs and behaviors rather than just atomic indicators is the key to hunting beyond the basics.

Cyber Kill Chain

Hunting is often mapped to the Cyber Kill Chain, which breaks down the stages of an attack. Understanding each phase allows hunters to anticipate adversary activity and focus on detection opportunities.

Cyber Kill Chain
PhaseThreat Hunting Relevance
ReconnaissanceInformation gathering; often subtle or invisible in logs
WeaponizationPayload creation; typically undetectable until delivered
DeliveryFirst observable phase, e.g., phishing email or USB drop
ExploitationPayload execution, privilege escalation, lateral movement
InstallationBackdoor installation and persistence setup
Command & ControlC2 communication; hunters can capture anomalous traffic
Actions on ObjectivesData exfiltration or destruction; final adversary goal

By aligning hunts to this framework, hunters can prioritize investigations and anticipate adversary behavior.

MITRE ATT&CK Mapping

MITRE ATT&CK provides a structured library of adversary behaviors, enabling hunters to map activities to tactics and techniques. Mapping hunts to ATT&CK:

  • Improves detection coverage across systems
  • Allows reusable detection queries and rules
  • Provides a common language for threat intelligence and incident response teams

Threat Hunting Methodologies

Intelligence Driven Hunting

Intelligence driven hunting starts with threat intelligence to formulate a testable hypothesis. For example, if a vendor report indicates a specific APT is targeting your industry using DLL search order hijacking, a hunter might query endpoint logs for suspicious DLL loading patterns.

Data Driven Hunting

Data driven hunting relies primarily on internal telemetry to identify anomalies. Patterns such as repeated failed logins, unusual PowerShell execution, or abnormal data transfers can reveal threats even before intelligence indicators are available.

Knowledge Based Hunting

Knowledge based hunting depends on deep expertise. Hunters leverage their understanding of network architecture, endpoints, normal baselines, and known adversary TTPs to formulate hypotheses and detect sophisticated activity. This approach is often used to identify emerging threats or sophisticated attacks that evade traditional detection.

Data Collection & Log Management

Comprehensive data collection is the backbone of threat hunting. Key sources include:

  • Endpoint logs: Sysmon, PowerShell, Windows Event Logs, application logs
  • Network telemetry: Netflow, proxy, firewall, DNS, packet captures
  • Cloud & SaaS logs: CloudTrail, GCP logs, remote access portals

Proper log retention, normalization, and enrichment are critical. Tools like Splunk, ELK Stack, and Velociraptor help aggregate telemetry, making it actionable for hunts.

IOC Correlation

Raw IOCs are often insufficient in isolation. Correlating indicators across time, source, and tools provides context and actionable intelligence. Correlation techniques include:

  • Exact Matching: Matching IPs, hashes, or domains across multiple feeds
  • Infrastructure Pivoting: Mapping related infrastructure to reveal hidden links
  • Fuzzy Matching: Detecting near identical malware or lookalike domains
  • Time Based Correlation: Reconstructing events to visualize attack progression
  • TTP and Campaign Linking: Mapping behaviors to known adversaries

Endpoint & Network Threat Hunting

Endpoint hunting focuses on detecting anomalies at the system level, including:

  • Suspicious process execution and parent child relationships
  • Unauthorized registry or service modifications
  • Malicious scheduled tasks
  • Unusual PowerShell or script activity

Network hunting emphasizes protocol misuse, anomalous traffic patterns, and abnormal volumes, often leveraging packet captures and telemetry from firewalls, proxies, and IDS/IPS systems.

Sysmon Event IDs for Threat Hunting

Sysmon provides high fidelity telemetry for endpoint monitoring. Key event IDs for hunters include:

Event IDDescription
1Process creation; monitor parent-child relationships and commands
2File creation time changes; detect timestomping attempts
3Network connections; track C2 and suspicious outbound activity
5Process termination; observe abnormal lifecycles
6Driver loaded; detect unauthorized driver insertion
7Image loaded; monitor DLLs for malicious injection
8CreateRemoteThread; potential code injection activity
10Process access; detect privilege escalation attempts
11File creation; monitor unusual or hidden files
12Registry value change; track persistence modifications
13Registry value deletion; detect tampering or evasion
14Registry value rename; identify stealthy modifications
15File stream creation; monitor for alternate data streams
22DNS query; detect suspicious external lookups

These events form the foundation for behavioral threat detection, enabling hunters to detect activity beyond simple signatures or IOCs.

Conclusion

Threat hunting is both an offensive and defensive approach for identifying anomalies. By combining intelligence driven, data driven, and knowledge based approaches, hunters can proactively detect sophisticated adversaries. Coupled with robust telemetry, proper IOC correlation, and MITRE ATT&CK mapping, organizations can significantly reduce dwell time and strengthen their security posture.

With visuals for the Kill Chain, IOC correlation, and ATT&CK mapping, this guide can serve as both a conceptual framework and a practical roadmap for professional threat hunters.

This post is licensed under CC BY 4.0 by the author.