top of page

Threat Hunt (TH) Programs Part 2 - Threat Hunt Mission In-Take, Prioritization, design/Scoping/Targeting

  • brencronin
  • 12 hours ago
  • 5 min read

Threat Hunt Mission Intake, Prioritization, Design, Scoping, and Targeting - Standard Operating Procedure (SOP)


1. Purpose


This SOP establishes the standardized process for intaking, prioritizing, designing, scoping, and targeting Threat Hunt missions within the organization. The goal is to ensure threat hunting activities are centrally coordinated, strategically prioritized, and executed in a structured and repeatable manner that maximizes operational effectiveness and visibility to leadership.


2. Scope


This procedure applies to all Threat Hunt missions conducted by the Threat Hunting team and includes coordination with Cyber Threat Intelligence (CTI), Security Operations Center (SOC), Detection Engineering, and Incident Response teams.


3. Threat Hunt Mission Intake


All Threat Hunt missions must be formally recorded and tracked within a centralized Threat Hunt Mission Tracker or Register. This centralized system enables effective mission planning, coordination among team members, and visibility into mission progress and outcomes.

Each new mission must be logged during the mission intake process, which documents the origin, objective, and initial scope of the proposed threat hunt.


3.1 Primary Sources of Threat Hunt Missions


Threat Hunt missions may originate from several sources, including:


1. Organizational Security Incidents


Threat hunts initiated following a cybersecurity incident to determine whether related activity occurred elsewhere in the environment.


2. Leadership Directives


Threat hunts directed by organizational leadership based on perceived risk, emerging threats, or operational priorities.


3. Cyber Threat Intelligence (CTI) – Organization-Specific Threats


Threat intelligence indicating that specific threat actors, campaigns, or techniques may target the organization.


4. Cyber Threat Intelligence – Industry Trends


Threat intelligence identifying emerging threats, tactics, or attack campaigns affecting the organization's industry sector.


Each intake record must document:

  • Mission origin

  • Threat actor or threat activity

  • Relevant intelligence sources

  • Initial mission objective

  • Intake date


4. Threat Hunt Mission Prioritization


Because threat hunting missions may originate from multiple sources and cybersecurity threats evolve rapidly, all missions must be prioritized within the Threat Hunt mission tracker.


A priority field must be included within the mission tracking register.


4.1 Priority Determination Factors


Mission priority should be determined based on:

  • Threat severity

  • Organizational risk

  • Known active exploitation

  • Leadership directives

  • Impact to critical systems

  • CTI confidence and relevance

  • Current operational workload


Leadership frequently receives intelligence and threat reporting that may generate multiple hunting requests in a short period of time. While these requests may all represent valid concerns, threat hunts require sufficient time to conduct proper analysis.


The prioritization process ensures the team can answer operational questions such as:


  • Should the current mission be paused to start a higher-priority hunt?

  • Should the current mission be completed before starting the next one?


Proper prioritization ensures efficient use of analyst time while aligning threat hunting efforts with organizational risk priorities.


5. Threat Hunt Mission Design


Threat Hunt mission design defines the analytical structure of the hunt, including investigative methods and required tasks.


Threat hunt activities typically fall into several analytical categories.


5.1 Common Threat Hunt Task Categories


Threat Hunt tasks typically include:


1. Simple IOC-Based Hunts


Searching for indicators such as:

  • IP addresses

  • URLs/domains

  • File hashes


2. Binary Abuse Hunts


Analysis of binaries commonly abused by attackers (e.g., administrative utilities, scripting engines).


3. APT Tactics, Techniques, and Procedures (TTP) Hunts


Hunts focused on behavioral patterns associated with known threat actors.


4. Hypothesis-Based Threat Hunting


Structured hunts based on a formal hypothesis regarding attacker behavior within the environment.


5.2 Threat Hunt Methodology Considerations


Some practitioners consider hypothesis-based hunting to represent the highest maturity level of threat hunting. However, effective threat hunting programs often combine multiple methods.


For example, a single threat hunt mission targeting a specific threat actor may include:


  • IOC searches

  • Binary abuse analysis

  • TTP behavioral analysis

  • Hypothesis testing


Breaking a threat hunt mission into these analytical categories allows the mission to be conducted systematically and comprehensively.


6. Threat Hunt Modular Design


Threat Hunt missions should be broken into individual analytical modules. Modular design improves mission planning, execution, and reporting.


6.1 Benefits of Modular Threat Hunting


Modular design enables:


  • More accurate time estimation

  • Task effective delegation across team members

  • Workload balancing between junior and senior analysts

  • Performance tracking and trending

  • Structured mission progress reporting


6.2 Example Difficulty Classification


Threat Hunt modules may be categorized by difficulty level:

Difficulty Level

Example Task Type

Light

Simple IOC searches

Medium

Binary usage analysis

Moderately Difficult

APT TTP analysis

Difficult

Hypothesis-based hunts

Very Difficult

Hunts requiring custom data parsing or advanced telemetry analysis

6.3 Example Threat Hunt Mission Plan


A threat hunt mission targeting a specific threat actor may be structured as follows:

Module

Task

Estimated Time

Module 1

IP IOC sweeps

4 hours

Module 2

URL IOC sweeps

4 hours

Module 3

File hash IOC sweeps

4 hours

Module 4

Binary abuse analysis (certutil)

8 hours

Module 5

Binary abuse analysis (curl)

8 hours

Module 6

Additional binary abuse analysis

8 hours

Module 7

Initial access TTP analysis

12 hours

Module 8

Persistence TTP analysis

12 hours

Module 9

Command-and-control (C2) analysis

12 hours

7. Threat Hunt Module Reuse and Intelligence Integration


Threat Hunt modules should contribute to long-term security improvements.


7.1 IOC Integration


All collected indicators should be integrated into the organization's Threat Intelligence Platform (TIP) and security tools.


IOC hunting evaluates historical activity. Even if no malicious activity is identified during the hunt, those indicators may be used by adversaries in the future.


Integrating indicators into detection systems ensures future visibility if the threat actor reuses infrastructure.


7.2 Binary and TTP Baselines


Over time, threat hunts will produce baseline understanding of normal behavior across the organization.


Examples include:


  • Baseline usage patterns for binaries such as certutil or curl

  • Common administrative behaviors

  • Expected network communication patterns


These baselines allow:


  • Reuse of previously developed hunt queries

  • Conversion of hunt queries into detection rules

  • Improved detection engineering coverage


8. Threat Hunt Mission Targeting


Threat Hunt targeting defines:


  • Data sources to analyze

  • Detection methods

  • Analytical techniques

  • Required telemetry


Targeting ensures each module clearly identifies:


  • Relevant log sources

  • Analytical queries

  • Investigation steps

  • Expected outputs


9. Threat Hunt Mission Scoping


Once modules have been defined, the overall scope and duration of the mission can be estimated.


Mission scoping provides leadership with visibility into:


  • Estimated completion timelines

  • Analytical coverage

  • Resource requirements


Leadership often seeks answers to key operational questions:


  • Are we currently exposed to this threat?

  • How long until the threat hunt is complete?

  • Do additional resources need to be deployed?


Threat hunt modularization allows teams to provide realistic completion estimates while maintaining analytical rigor.


10. Threat Hunt Mission Time-Boxing


Threat hunt modules enable time-boxed execution, meaning each analytical task is allocated a specific time window for investigation. Concept taken from Sydney Marrone 'When to Stop Hunting'.


Time-boxing allows:


  • Efficient use of analyst time

  • Structured mission progress

  • Dynamic reprioritization if new threats emerge


For example:


If a higher priority threat appears during an ongoing hunt, leadership may decide to:


  • Pause remaining modules

  • Re-scope the hunt

  • Redirect resources to the new threat


This approach balances thorough investigation with operational agility.


11. Threat Hunt Confidence Levels


Threat hunt results should be communicated using confidence levels, which describe the level of analytical coverage achieved. Concept taken from Sydney Marrone 'When to Stop Hunting'.


Common confidence levels include:


Low Confidence


Some queries were executed, but investigation depth was limited.


Example:"Initial queries were executed with no findings."


Medium Confidence


Primary data sources were analyzed but some visibility gaps remain.

Example:"Key data sources were analyzed and no malicious activity was identified. However, coverage gaps exist in specific telemetry areas."


High Confidence


All relevant data sources were analyzed across the full time window and investigative methods were validated.


Example:"All relevant data sources were analyzed across the full investigation period. Detection logic was validated through simulation and no evidence of malicious activity was identified."


Intelligence Confidence Communication


Threat hunt teams should adopt structured confidence terminology commonly used in intelligence analysis when communicating results to leadership.


Using consistent confidence language helps leadership:


Understand investigation completeness

  • Assess residual risk

  • Make informed operational decisions.


References


When to Stop Hunting




 
 
 

Recent Posts

See All
Defender XDR - Part 5f - Unified Console

Rolling Aerts into Incidents - XDR A key strength of Microsoft Defender is its ability to correlate disparate alerts from various detection sources into a single, cohesive incident view. This approach

 
 
 

Comments


Post: Blog2_Post
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page