Threat Hunting
Assuming the breach has already happened.
1. The Hypothesis
Hunting is not "scrolling through logs". It starts with a question.
- Bad Hypothesis: "I'll look for bad stuff in the firewall logs."
- Good Hypothesis: "If an attacker used Kerberoasting, I would see high volumes of TGS requests (Event 4769) with RC4 encryption (Ticket Encryption Type 0x17) from a single user."
2. The Hunt Loop
- Hypothesis: Define attack TTP (MITRE ATT&CK).
- Data: Identify required logs/proof.
- Execute: Query the SIEM/Endpoints.
- Analyze: Filter out admins/service accounts (exclude known good).
- Outcome:
- Incident: Found evil -> Trigger IR.
- Gap: No logs found -> Request new logging.
- Detection: Found attack pattern -> convert Hunt query into automated Alert.
3. Outlier Analysis (Stacking)
- Long Tail Analysis: "Show me the least common
svchost.exeparent processes." - Frequency Analysis: "Show me users who logged into >50 hosts in 1 hour."