Overview
Threat hunting is the proactive process of searching for cyber threats that may have evaded automated detection systems. UTMStack provides comprehensive tools for threat hunters to explore data, test hypotheses, and discover advanced threats. Primary hunting capabilities are available through/discover (log analysis), /threat-intelligence (threat intel), and /data (data management).
Hypothesis-Driven
Develop and test threat hypotheses based on TTPs
Data Exploration
Query and analyze security data at
/discoverThreat Intelligence
Leverage threat intel from
/threat-intelligencePattern Recognition
Identify anomalous patterns and behaviors
Threat Hunting Methodology
Hunting Approaches
Hypothesis-Driven
Start with specific threat hypothesis based on intelligence or experience
Baseline-Driven
Identify deviations from established baselines of normal activity
Model-Driven
Use behavioral models and analytics to detect anomalies
The Hunting Loop
Develop Hypothesis
Create a testable hypothesis about potential threat activity based on:
- Threat intelligence from
/threat-intelligence - Known attack techniques (MITRE ATT&CK)
- Environment-specific risks
- Recent security incidents from
/incident
Collect Data
Identify and access relevant data sources at
/data and /data-sources:- Network traffic logs
- Endpoint telemetry
- Authentication logs
- Cloud service logs
- Application logs
Analyze Data
Query and explore data using
/discover to search for indicators:- Apply filters and search queries
- Visualize patterns and trends
- Correlate across multiple data sources
Investigate Findings
Deep dive into suspicious activity:
- Gather additional context
- Pivot to related events
- Timeline reconstruction
- Asset and user profiling from
/data-sources
Respond
Take appropriate action based on findings:
- Create alert rules at
/alerting-rulesfor detection - Create incident at
/incidentif threat confirmed - Trigger SOAR playbook at
/soarfor remediation
Hunting with Log Discovery
Using the Discover Interface
The/discover interface provides powerful log analysis capabilities:
Search Queries
Full-text search across all indexed log data
Field Filtering
Filter by specific fields and values
Time Range
Narrow searches to specific time periods
Field Statistics
View top values and distributions
Pattern Detection
Identify patterns in log data
Export Results
Export hunt results for further analysis
Advanced Search Techniques
Boolean Operators
Field Aggregations
- Top N Analysis - Identify most frequent values (e.g., top talking hosts)
- Unique Counts - Count distinct values (e.g., unique users per system)
- Rare Item Detection - Find infrequent values that may be suspicious
- Temporal Analysis - Analyze activity patterns over time
Common Hunting Queries
Credential Access Hunting
Credential Access Hunting
Hunt for credential theft and abuse:
Lateral Movement Detection
Lateral Movement Detection
Identify adversary movement across the network:
Command and Control (C2)
Command and Control (C2)
Detect C2 communications:
Data Exfiltration
Data Exfiltration
Hunt for data theft activity:
Persistence Mechanisms
Persistence Mechanisms
Identify persistence techniques:
Threat Intelligence Integration
Leveraging Threat Intel
Use/threat-intelligence to enhance hunting:
Review Current Threats
Navigate to
/threat-intelligence to review latest threat intelligence:- Active threat campaigns
- Known IOCs (IPs, domains, hashes)
- Adversary TTPs and behaviors
Extract Hunting Leads
Identify specific indicators and behaviors to hunt for:
- Extract IOCs for searching
- Note adversary TTPs mapped to MITRE ATT&CK
- Identify relevant data sources
Search for Indicators
Query logs at
/discover for threat intelligence matches:- Search for specific IOCs
- Look for behavioral patterns
- Check historical data for past presence
IOC Hunting
Search for indicators of compromise:IP Addresses
Search network logs for connections to malicious IPs
Domain Names
Check DNS queries and HTTP traffic for malicious domains
File Hashes
Look for known malicious file hashes in endpoint data
File Paths
Search for suspicious file locations and names
Registry Keys
Identify malicious registry modifications
User Agents
Detect anomalous or malicious user agent strings
MITRE ATT&CK Framework
Hunting by Tactic
Organize hunts around MITRE ATT&CK tactics:Initial Access
Phishing, exploits, supply chain compromise
Execution
PowerShell, scripts, command-line tools
Persistence
Registry, scheduled tasks, services
Privilege Escalation
Token manipulation, exploitation
Defense Evasion
Obfuscation, disabling security tools
Credential Access
Credential dumping, keylogging
Discovery
Network scanning, system enumeration
Lateral Movement
Remote services, internal spear phishing
Collection
Data staging, screen capture
Command & Control
C2 channels, proxy usage
Exfiltration
Data transfer, exfiltration to cloud
Impact
Data destruction, ransomware
Technique-Based Hunts
Create hunts for specific ATT&CK techniques:Asset and User Profiling
Baseline Normal Behavior
Establish baselines using/data-sources and /discover:
User Baselines
- Typical login times and locations
- Common accessed resources
- Normal network activity patterns
- Standard application usage
Asset Baselines
- Expected network connections
- Normal process execution
- Typical resource utilization
- Standard service configurations
Anomaly Detection Workflow
Identify Outliers
Look for activities that deviate from baseline:
- Unusual login times or locations
- First-time network connections
- New processes or services
- Abnormal data volumes
Investigate Anomalies
Examine outliers for malicious indicators:
- Check threat intelligence at
/threat-intelligence - Review asset context from
/data-sources - Correlate with other security events
Hunting Frameworks and Methodologies
Sqrrl Threat Hunting Loop
- Create Hypothesis - Develop educated guess about attacker behavior
- Investigate via Tools - Use
/discoverand other tools to test hypothesis - Discover New Patterns - Uncover new attack patterns and TTPs
- Inform and Enrich Analytics - Feed findings into detection systems
TaHiTI Framework
Threat Hunting Maturity Model levels:| Level | Description | Characteristics |
|---|---|---|
| TH0 | Initial | Ad-hoc, reactive hunting based on alerts |
| TH1 | Minimal | Routine collections, basic hypothesis testing |
| TH2 | Procedural | Data analysis procedures, hunt procedures |
| TH3 | Innovative | Novel techniques, custom analytics |
| TH4 | Leading | Automate successful hunts, create new TTPs |
Hunt Documentation
Recording Hunt Results
Document the following:- Hypothesis - What you were hunting for and why
- Data Sources - Which logs and systems were analyzed
- Queries Used - Specific search queries from
/discover - Findings - What was discovered (threats or absence of threats)
- IOCs Identified - Any indicators found during the hunt
- Actions Taken - Rules created, incidents opened, etc.
- Recommendations - Improvements to detection or security posture
- Time Investment - Hours spent on the hunt
Creating Hunting Dashboards
Converting Hunts to Detections
Hunt to Alert Workflow
Hunting Tools and Techniques
Statistical Analysis
Frequency Analysis
Identify rarely occurring events that may be suspicious
Stack Ranking
Compare similar items to find outliers (e.g., processes by hash)
Time Series
Detect temporal anomalies and patterns
Clustering
Group similar behaviors to identify outliers
Data Pivoting
Pivot from initial findings to expand investigation:- IP Pivot - Find all activity from suspicious IP
- User Pivot - Investigate all actions by suspicious user
- Hash Pivot - Locate all instances of suspicious file
- Domain Pivot - Find related domain infrastructure
- Time Pivot - Examine activity in time window around event
- Process Pivot - Track parent-child process relationships
Collaboration and Sharing
Hunt Team Coordination
Hunt Calendar
Schedule regular hunt missions and assign responsibilities
Hypothesis Sharing
Share hunt ideas and collaborate on hypothesis development
Results Review
Regular meetings to review hunt findings and share techniques
Knowledge Base
Maintain repository of hunt queries and methodologies
Threat Intelligence Sharing
Share hunt findings:- Internal - Update
/threat-intelligencewith discovered IOCs and TTPs - External - Contribute to ISACs and threat intelligence communities
- Detection Rules - Share successful hunt-derived rules at
/alerting-rules - Hunt Reports - Document and share hunt methodologies
Best Practices
Effective Hunting
- Start with Intelligence - Use threat intel from
/threat-intelligenceto guide hunts - Document Everything - Record all hunts, findings, and queries
- Focus on High-Value - Hunt in areas with greatest risk or visibility gaps
- Regular Cadence - Schedule recurring hunts (weekly, monthly)
- Convert to Detection - Turn successful hunts into automated rules
- Share Knowledge - Collaborate with team and broader community
- Measure Progress - Track hunts conducted, threats found, rules created
Common Pitfalls to Avoid
- Over-reliance on IOCs - Focus on behaviors, not just indicators
- Analysis Paralysis - Set time limits for hunt missions
- Ignoring Negative Results - Document hunts that find nothing
- Poor Documentation - Always record methodology and findings
- Hunting in Isolation - Collaborate with team members
- Forgetting to Close Loop - Convert findings to automated detection
Related Resources
Log Discovery
Primary interface for hunting in log data
Threat Intelligence
Leverage threat intel for hunt hypotheses
Alerting Rules
Convert hunts to automated detection
Data Sources
Understand available data for hunting