Threat Hunting Basics
Threat hunting is the proactive practice of searching for hidden threats or malicious activity within an organization’s environment, before or after alerts are triggered. Its main goal is to uncover attacks early, reducing the dwell time, which is the period an adversary remains undetected in the network.
Dwell time refers to the period an attacker remains undetected in your environment. Minimizing dwell time is critical because even a few hours of undetected activity can lead to stolen credentials, lateral movement, and data exfiltration.
Why Traditional Security Tools Fall Short
While AV and EDR solutions are valuable, they inherently rely on predefined detection rules such as known file hashes, signatures, or behavioral indicators. These tools are excellent at catching known threats but often fail against:
- Zero day malware that has never been seen before
- Advanced Persistent Threats (APT) employing novel techniques
- Insider threats or misconfigurations that behave like legitimate activity
Traditional security tools are fundamentally reactive. If a malicious action does not match a signature or known behavior, it can easily go unnoticed. Threat hunting fills this gap, enabling security teams to actively search for anomalies, uncover stealthy attacks, and improve detection over time.
The Value of Threat Hunting
Threat hunting goes beyond simply finding malware or malicious IPs. It allows security teams to uncover critical weaknesses that may otherwise remain hidden, such as:
- Misconfigured devices that could be exploited
- Unpatched software on critical servers
- Unauthorized or suspicious software installations
- Evidence of privilege escalation or unauthorized account activity
In addition to immediate detection, hunting provides insights that improve overall security posture. Every hunt refines detection rules, enhances log collection practices, and informs proactive risk mitigation strategies.
When Should You Hunt?
Threat hunting can be initiated in multiple scenarios. Some hunts are scheduled periodically to ensure no anomalies go unnoticed, while others are reactive to intelligence or internal alerts. Common triggers include:
- Routine proactive hunts within organizations that maintain dedicated hunting teams
- New threat intelligence indicating emerging attacks targeting your sector
- SOC or IR alerts highlighting suspicious activity that requires deeper investigation
- Findings from previous hunts, where anomalies were identified but not fully investigated
- Post-risk assessment validation, focusing on high value systems or sensitive data
Effectively, threat hunting is both a strategic and tactical process, balancing routine assessments with intelligence driven investigations.
The Threat Hunting Lifecycle
A successful threat hunt follows a defined lifecycle, which ensures both structure and repeatability:
- Trigger: Define why the hunt is happening. This usually takes the form of a hypothesis, informed by intelligence, risk assessments, or anomalies.
- Investigation: Dive into internal telemetry collect logs, analyze network traffic, and validate the hypothesis against real world data.
- Resolution: Conclude the hunt by documenting findings, feeding insights into SIEM rules, and updating playbooks for future hunts. Post hunt analysis often leads to new hypotheses and detection improvements.
Types of Threat Hunts
Threat hunting is not one-size-fits-all. Different hunts focus on different sources of intelligence and methodologies:
Structured Hunts
Structured hunts focus on known adversary TTPs (Tactics, Techniques, Procedures), often derived from frameworks like MITRE ATT&CK. Instead of searching for specific indicators, structured hunts focus on behavioral patterns that attackers are likely to use. For example, a hunter might look for evidence of lateral movement or persistence techniques even if no known malware is detected.
Unstructured Hunts
Unstructured hunts are typically IOC driven, beginning with indicators of compromise obtained from threat intelligence, previous incidents, or alerts from SOC/IR teams. These hunts involve searching logs and telemetry for any activity that matches these known indicators, and can reveal early stage intrusions or stealthy activity.
Situational Hunts
Situational hunts target high value systems or assets identified as high risk. For example, a public facing customer portal with sensitive data may be the focus. Hunters analyze deviations from expected behavior, such as unusual login patterns, access from unexpected geolocations, or abnormal file access.
The Pyramid of Pain
The Pyramid of Pain is a concept that helps hunters prioritize the value of indicators:
| Indicator Type | Hunting Impact |
|---|---|
| Hash Values | Easy to detect, but attackers can easily change them |
| IP Addresses | Moderately valuable; attackers can rotate IPs |
| Domain Names | Harder to change; requires registration and hosting effort |
| Network/Host Artifacts | Attacker must modify tactics or infrastructure; valuable detection points |
| Tools | Disrupts adversary operations; forces new tools or methods |
| TTPs | Most valuable; behavior based detection forces attackers to change techniques |
Focusing on TTPs and behaviors rather than just atomic indicators is the key to hunting beyond the basics.
Cyber Kill Chain
Hunting is often mapped to the Cyber Kill Chain, which breaks down the stages of an attack. Understanding each phase allows hunters to anticipate adversary activity and focus on detection opportunities.
| Phase | Threat Hunting Relevance |
|---|---|
| Reconnaissance | Information gathering; often subtle or invisible in logs |
| Weaponization | Payload creation; typically undetectable until delivered |
| Delivery | First observable phase, e.g., phishing email or USB drop |
| Exploitation | Payload execution, privilege escalation, lateral movement |
| Installation | Backdoor installation and persistence setup |
| Command & Control | C2 communication; hunters can capture anomalous traffic |
| Actions on Objectives | Data exfiltration or destruction; final adversary goal |
By aligning hunts to this framework, hunters can prioritize investigations and anticipate adversary behavior.
MITRE ATT&CK Mapping
MITRE ATT&CK provides a structured library of adversary behaviors, enabling hunters to map activities to tactics and techniques. Mapping hunts to ATT&CK:
- Improves detection coverage across systems
- Allows reusable detection queries and rules
- Provides a common language for threat intelligence and incident response teams
Threat Hunting Methodologies
Intelligence Driven Hunting
Intelligence driven hunting starts with threat intelligence to formulate a testable hypothesis. For example, if a vendor report indicates a specific APT is targeting your industry using DLL search order hijacking, a hunter might query endpoint logs for suspicious DLL loading patterns.
Data Driven Hunting
Data driven hunting relies primarily on internal telemetry to identify anomalies. Patterns such as repeated failed logins, unusual PowerShell execution, or abnormal data transfers can reveal threats even before intelligence indicators are available.
Knowledge Based Hunting
Knowledge based hunting depends on deep expertise. Hunters leverage their understanding of network architecture, endpoints, normal baselines, and known adversary TTPs to formulate hypotheses and detect sophisticated activity. This approach is often used to identify emerging threats or sophisticated attacks that evade traditional detection.
Data Collection & Log Management
Comprehensive data collection is the backbone of threat hunting. Key sources include:
- Endpoint logs: Sysmon, PowerShell, Windows Event Logs, application logs
- Network telemetry: Netflow, proxy, firewall, DNS, packet captures
- Cloud & SaaS logs: CloudTrail, GCP logs, remote access portals
Proper log retention, normalization, and enrichment are critical. Tools like Splunk, ELK Stack, and Velociraptor help aggregate telemetry, making it actionable for hunts.
IOC Correlation
Raw IOCs are often insufficient in isolation. Correlating indicators across time, source, and tools provides context and actionable intelligence. Correlation techniques include:
- Exact Matching: Matching IPs, hashes, or domains across multiple feeds
- Infrastructure Pivoting: Mapping related infrastructure to reveal hidden links
- Fuzzy Matching: Detecting near identical malware or lookalike domains
- Time Based Correlation: Reconstructing events to visualize attack progression
- TTP and Campaign Linking: Mapping behaviors to known adversaries
Endpoint & Network Threat Hunting
Endpoint hunting focuses on detecting anomalies at the system level, including:
- Suspicious process execution and parent child relationships
- Unauthorized registry or service modifications
- Malicious scheduled tasks
- Unusual PowerShell or script activity
Network hunting emphasizes protocol misuse, anomalous traffic patterns, and abnormal volumes, often leveraging packet captures and telemetry from firewalls, proxies, and IDS/IPS systems.
Sysmon Event IDs for Threat Hunting
Sysmon provides high fidelity telemetry for endpoint monitoring. Key event IDs for hunters include:
| Event ID | Description |
|---|---|
| 1 | Process creation; monitor parent-child relationships and commands |
| 2 | File creation time changes; detect timestomping attempts |
| 3 | Network connections; track C2 and suspicious outbound activity |
| 5 | Process termination; observe abnormal lifecycles |
| 6 | Driver loaded; detect unauthorized driver insertion |
| 7 | Image loaded; monitor DLLs for malicious injection |
| 8 | CreateRemoteThread; potential code injection activity |
| 10 | Process access; detect privilege escalation attempts |
| 11 | File creation; monitor unusual or hidden files |
| 12 | Registry value change; track persistence modifications |
| 13 | Registry value deletion; detect tampering or evasion |
| 14 | Registry value rename; identify stealthy modifications |
| 15 | File stream creation; monitor for alternate data streams |
| 22 | DNS query; detect suspicious external lookups |
These events form the foundation for behavioral threat detection, enabling hunters to detect activity beyond simple signatures or IOCs.
Conclusion
Threat hunting is both an offensive and defensive approach for identifying anomalies. By combining intelligence driven, data driven, and knowledge based approaches, hunters can proactively detect sophisticated adversaries. Coupled with robust telemetry, proper IOC correlation, and MITRE ATT&CK mapping, organizations can significantly reduce dwell time and strengthen their security posture.
With visuals for the Kill Chain, IOC correlation, and ATT&CK mapping, this guide can serve as both a conceptual framework and a practical roadmap for professional threat hunters.

