top of page

Threat Hunt (TH) Program Part 8 - Threat Hunt Mission Reporting

  • brencronin
  • 2 days ago
  • 9 min read

Threat Hunt Mission Reporting SOP


1. Purpose


This Standard Operating Procedure (SOP) defines the requirements, structure, and standards for producing Threat Hunt Mission Reports. A Threat Hunt Mission Report is the formal deliverable published upon the completion of every Threat Hunt mission. It provides stakeholders with a comprehensive record of the hunt objectives, methodology, findings, indicators of compromise, detection outputs, and recommendations for improving the organization's security posture.


This SOP governs report content, section requirements, and the responsibilities of Threat Hunters and Threat Hunt Reviewers in producing and approving reports.


2. Scope


This SOP applies to all Threat Hunt missions executed by the SOC Threat Hunt team. A report is required for every completed mission, regardless of whether a threat was identified. Negative results are a valid and important mission outcome and must be documented in accordance with this SOP.


3. Roles and Responsibilities


3.1 Threat Hunter


  • Responsible for authoring all sections of the Threat Hunt Mission Report.

  • Must complete and submit the report within the timeframe specified by the Threat Hunt Lead upon mission closure.

  • Ensures all queries, IOCs, findings, and recommendations are accurately documented.


3.2 Threat Hunt Reviewer


  • Reviews the completed report for accuracy, completeness, and analytical soundness.

  • Approves the report prior to publication and distribution to stakeholders.

  • May return the report to the author for revision with documented comments.


NOTE: Threat Hunt Mission Reports are published only after formal Reviewer approval.


4. Report Structure and Section Requirements


Every Threat Hunt Mission Report must include all sections defined in this SOP. Sections that do not apply to a given mission must be retained and populated with 'N/A' along with a brief explanatory note. The required report structure is as follows:

 

Section

Title

Requirement

1

Executive Summary

Required — must be completed for every mission

2

Stakeholder Requirements

Required — summarizes hunt scope and tasking

3

Key Findings

Required — populate N/A with note if no findings

4

Detection Methods

Required — reference current MITRE ATT&CK v18 detection strategies

5

KQL Queries

Required — list all hunt queries executed

6

Indicators of Compromise

Required — list IOCs or reference Appendix A

7

Chronology of Events

Required — N/A if no foothold identified

8

Analysis Summary

Required — include time range and log sources

9

Mission Completion Products

Required — list all outputs produced

10

Recommendations

Required — include mitigations table and D3FEND controls

11

References

Required

Appendix A

IOC Master List

Required if IOC volume warrants separate listing

 

5. Section-by-Section Guidance and Requirements


5.1 Section 1 — Executive Summary


The Executive Summary provides a concise overview of the mission for leadership and non-technical stakeholders. It must be written in plain language and must not assume technical expertise. The Executive Summary consists of three required subsections:


5.1.1 Incident


If the Threat Hunt mission arose directly from a security incident or was tasked as part of an incident response, this subsection must document the relevant incident details, including the incident reference number, date, and a brief description of the triggering event. If the hunt was proactive and not incident-driven, enter: 'This Threat Hunt mission was proactively tasked and was not initiated in response to a specific security incident.'


5.1.2 Action


Summarize the actions taken during the mission. This should be a brief narrative, typically two to four sentences, describing the type of analysis performed.


NOTE: Example: 'Research was conducted into threat actor indicators of compromise (IOCs), binary abuse, and tactics, techniques, and procedures (TTPs) to develop and execute targeted Threat Hunt queries across the environment.'


5.1.3 Conclusion


Summarize the overall outcome of the mission in two to five sentences. State clearly whether malicious activity, suspicious behavior, or security control gaps were identified. Reference key findings where relevant. If no threat activity was identified, state this explicitly.


5.2  Section 2 — Stakeholder Requirements


This section documents the formal requirements and analytical objectives that were established for the mission. It must include the following three components:

 

  • Threat Hunting Actions and Expanded Timeline Analysis: Describe the specific hunting actions undertaken and the time range over which the hunt was conducted. Include the scope of data sources, log types, and systems analyzed.

  • Threat Actor Profile: If the mission was focused on a specific threat actor or actor group, summarize the relevant threat actor profile, including known TTPs, tooling, and targeting behavior relevant to this mission.

  • Summary Analysis: Provide a high-level summary of the analytical approach used during the mission, including any pivoting performed based on initial findings.


5.3  Section 3 — Key Findings


The Key Findings section is the analytical core of the report. It is organized into the following structured subsections:

 

5.3.1  Customer Profile


Document relevant details about the customer environment as they pertain to the hunt. If no customer-specific profile information was identified or is relevant, enter 'None found in the environment.'

 

5.3.2  Threat Actor Profile Attribution


If attribution to a specific threat actor or group was determined or assessed, document the attribution rationale here, including supporting evidence such as overlapping TTPs, infrastructure, or tooling. If attribution could not be established, state this explicitly.

 

5.3.3  Targeting Assessment


Complete the following targeting assessment for the environment. For each criterion, select Yes or No and provide brief supporting commentary:


 

 

Vulnerability Present — A relevant, exploitable vulnerability exists in the environment

YES

NO

 

Threat Active — The threat actor or threat category is assessed as actively targeting similar environments

YES

NO

 

Access to Tooling and Data — Evidence suggests the threat actor has or could obtain the tooling or access required to execute against this environment

YES

NO

 

Mission Directive and High Value — The organization or its data represents a high-value target consistent with the assessed threat actor's mission directive

YES

NO

 

5.3.4  Threat Modeling


Document the threat modeling artifacts used and developed during the mission, organized by category:


  • IOC: List indicators of compromise used to scope the hunt, including hashes, IPs, domains, and URLs.

  • Binary: Document any malicious or suspicious binaries analyzed, including file names, hashes, and behavioral characteristics.

  • TTP: List the MITRE ATT&CK techniques and sub-techniques that formed the basis of the hunt hypothesis.

  • Hypothesis: State the threat hypothesis that the hunt was designed to test.

  • Anomaly-Based and Allowlisting: Document any anomaly-based detection approaches used, and note any allowlisting or baselining performed to reduce false positive volume.

 

5.3.5  Threat Categories Identified


For each of the following threat categories, document what was identified during the mission. If nothing was found in a category, enter 'None identified.'


  • IOC: Indicators identified during hunt execution.

  • Binary: Malicious or suspicious binaries identified.

  • TTP: Adversary techniques or sub-techniques observed in the environment.

  • Hypothesis: Whether the hunt hypothesis was confirmed, partially confirmed, or not confirmed, with supporting rationale.

  • Anomaly-Based / Allowlisting: Anomalous behaviors identified, and any allowlist entries created or recommended.


5.4 Section 4 — Detection Methods


Document the detection methods employed during the mission. Detection methods must be referenced using the current MITRE ATT&CK v18 Detection Strategies framework, which replaces the legacy Data Sources model. MITRE ATT&CK v18 introduced a Detection Overhaul, the new Detection Strategies object defines how a technique can be detected and mirrors real-world adversary behavior.


NOTE: Legacy MITRE ATT&CK data source references (e.g., DS0015 Application Log Content Inspection, DS0029 Network Traffic Content Inspection) may be included for backward compatibility with existing tooling documentation, but all new detections must reference the ATT&CK v18 Detection Strategies format.


For each technique analyzed, document the applicable detection strategy, the data source leveraged, and whether the detection was executed via query, alert rule, or manual analysis.

 

ATT&CK Technique

Detection Strategy (v18)

Data Source / Log Type

Detection Method

Example: T1059.001

Process Command-Line Monitoring

Microsoft-Windows-Sysmon/Operational

KQL Query / Sentinel Analytic

 

 

 

 

5.5 Section 5 — KQL Queries


List all KQL queries executed during the Threat Hunt mission. Each query entry must include the query name or description, the associated ATT&CK technique, the SIEM workspace or table targeted, and the query logic itself. Queries should be formatted in a code block for readability.


NOTE: All queries documented in this section must also be uploaded to the central Threat Hunt tracker as required by the Threat Hunt Mission Execution SOP.

Query Name / Description

ATT&CK Technique

KQL Query Logic

Example: Encoded PowerShell Execution

T1059.001

SecurityEvent | where EventID == 4688 | where CommandLine has "-EncodedCommand"

 

 

 

5.6  Section 6 — Indicators of Compromise (IOCs)


List all indicators of compromise identified during or used to scope the Threat Hunt mission. For large IOC sets (more than 20 entries), summarize the IOC categories here and reference Appendix A for the complete listing.

 

IOC Type

Value

Confidence

Context / Attribution

IP Address

192.168.1.1

High

C2 infrastructure — APT29

 

 

 

 





 

5.6.1  Profile Collections Found


Document any credential or profile collections identified during the mission, including account names, credential hashes, or profile data found in unexpected locations. If none were identified, enter 'None identified.'

 

5.6.2  MITRE ATT&CK Matrix Mapping


Provide a mapping of all identified findings to the MITRE ATT&CK Enterprise Matrix. Where possible, include a visual matrix excerpt or a tabular listing of all techniques and sub-techniques observed or tested during the mission, organized by Tactic.


5.7  Section 7 — Chronology of Events


If a threat foothold or intrusion was identified during the mission, document a chronological timeline of events here, including the first observed indicator, subsequent activity, and any lateral movement or escalation identified.

 

NOTE: If no foothold was identified during the mission, enter: 'N/A — No threat foothold was identified during this mission.'

Timestamp (UTC)

ATT&CK Technique

Event Description

YYYY-MM-DD HH:MM:SS

T####.###

Description of observed event.

 

 

 

 

5.8  Section 8 — Analysis Summary


Provide a narrative summary of the analytical work performed during the mission. This section must include:


  • The full time range covered by the Threat Hunt analysis (start date/time and end date/time, in UTC).

  • A complete list of log sources, tables, and data connectors searched during the mission.

  • A summary of the volume of data analyzed and any significant data quality or visibility issues encountered.

  • A narrative assessment of whether the environment was sufficiently visible to draw confident conclusions, or whether data gaps limited the hunt.

 

Hunt Time Range (UTC)

YYYY-MM-DD HH:MM to YYYY-MM-DD HH:MM

 

Log Sources Searched

List all Microsoft Sentinel tables, connectors, and third-party data sources queried

 

Total Query Results Reviewed

Approximate number

 

Data Visibility Assessment

Complete / Partial / Limited — with explanatory note

5.9  Section 9 — Threat Hunt Mission Completion Products


Document all products and deliverables produced as a result of this Threat Hunt mission. Each item must be listed with its status and a brief description. Include all of the following categories, marking any that are not applicable: 

Product Type

Status

Description / Reference

Microsoft Sentinel Queries

Complete / N/A

List query names or reference the Threat Hunt tracker.

Sentinel Analytics Rules

Complete / N/A

List analytics rule names and workspace deployed to.

Watchlist Updates

Complete / N/A

Describe any watchlists created or updated.

Visibility Gaps Identified

Complete / N/A

Document log sources or detection areas with insufficient coverage.

Host Deep Dives

Complete / N/A

List hosts subjected to deep-dive analysis and findings.

SOC Escalations

Complete / N/A

Describe any findings escalated to the SOC for follow-up investigation, including case or ticket reference numbers.

 

NOTE: SOC Escalations should reference the corresponding SOC incident or ticket number and include a brief description of what was escalated and the outcome, if known at time of report publication.


5.10  Section 10 — Recommendations


This section documents recommended actions to remediate identified gaps, strengthen detection coverage, and reduce risk. Recommendations are organized into two subsections: MITRE ATT&CK Enterprise Mitigations and MITRE D3FEND security controls.

 

5.10.1  Mitigations (MITRE ATT&CK Enterprise)


List all applicable MITRE ATT&CK Enterprise mitigations relevant to the findings of this mission. Reference the MITRE ATT&CK Enterprise Mitigations catalog (https://attack.mitre.org/mitigations/enterprise/). For each mitigation, complete the four-column table below. A memo row follows each mitigation entry for additional analyst commentary.


NOTE: Status definitions — Covered: The mitigation is implemented and verified. Verify: Implementation is expected but confirmation is needed. Uncovered: The mitigation is not in place. N/A: The mitigation is not applicable to this environment.


 

MITRE Mitigation ID

Mitigation Description

Status

Security Tooling Providing Coverage

M1026

Privileged Account Management — Manage the creation, modification, use, and permissions associated with privileged accounts.

Covered / Verify / Uncovered / N/A

e.g., Microsoft Entra PIM, CyberArk

Memo: Enter additional context, coverage notes, or analyst commentary here.

M1038

Execution Prevention — Block execution of code on a system through application control and/or script blocking.

Covered / Verify / Uncovered / N/A

e.g., Microsoft Defender for Endpoint, AppLocker

Memo: Enter additional context, coverage notes, or analyst commentary here.

M1049

Antivirus / Antimalware — Use signatures or heuristics to detect malicious software.

Covered / Verify / Uncovered / N/A

e.g., Microsoft Defender Antivirus, Crowdstrike

Memo: Enter additional context, coverage notes, or analyst commentary here.

[Add rows as needed]

 

 

 

Memo: Enter additional context, coverage notes, or analyst commentary here.

5.10.2  Security Controls (MITRE D3FEND)


List applicable defensive security controls from the MITRE D3FEND matrix (https://d3fend.mitre.org/) that are relevant to the mission findings. For each control, document implementation status and the tooling providing coverage, using the same table format as above.

 

D3FEND Technique ID

Defensive Technique Description

Status

Security Tooling Providing Coverage

D3-PSA

Process Spawn Analysis — Monitoring of process creation events for anomalous patterns.

Covered / Verify / Uncovered / N/A

e.g., Microsoft Sentinel, Sysmon

Memo: Enter additional context, coverage notes, or analyst commentary here.

D3-NTF

Network Traffic Filtering — Restricting network traffic based on criteria such as IP, port, or protocol.

Covered / Verify / Uncovered / N/A

e.g., Azure Firewall, Palo Alto NGFW

Memo: Enter additional context, coverage notes, or analyst commentary here.

[Add rows as needed]

 

 

 

Memo: Enter additional context, coverage notes, or analyst commentary here.


5.11  Section 11 — References


List all references cited or consulted during the mission and in the preparation of this report. References must include the source name and URL or document identifier where applicable.


Reference

URL / Identifier

MITRE ATT&CK Enterprise

MITRE ATT&CK v18 Detection Strategies

MITRE D3FEND Matrix

MITRE ATT&CK Enterprise Mitigations

[Additional references]

 

 Report Sign-Off

Role

Name (Print)

Date

Signature

Threat Hunter (Author)

 

 

 

Threat Hunt Reviewer

 

 

 

 

SOP References





 
 
 

Recent Posts

See All

Comments


Post: Blog2_Post
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page