top of page

Threat Hunt (TH) Programs - Understanding Threat Hunt Frameworks

  • brencronin
  • 14 hours ago
  • 9 min read

Updated: 13 hours ago

Threat Hunting Frameworks


Threat hunting is a proactive cybersecurity discipline that requires structure, strategy, and context. Two of the most popular threat hunting frameworks are PEAK and TaHiTI, with the MITRE ATT&CK framework playing a foundational role across all threat hunting efforts.


  • PEAK stands for Prepare, Execute, and Act with Knowledge.

  • TaHiTI stands for Targeted Hunting Integrating Threat Intelligence.

  • MITRE ATT&CK, while not a hunting framework per se, is a crucial reference for Tactics, Techniques, and Procedures (TTPs) and serves as the tactical map behind most modern threat hunts.

A Note on IOC-Based Threat Hunting Indicator of Compromise (IOC)-based threat hunting, such as searching for specific IP addresses, file hashes, or domains, has its place, especially for known threats. However, these data sweeps should ideally be automated through tools like firewalls, EDR/XDR, or SIEM correlation rules. Threat hunting should focus beyond the basics, leveraging behavioral analysis, threat modeling, and hypotheses.

The PEAK Framework


PEAK organizes threat hunting into three stages:


  1. Prepare

  2. Execute

  3. Act with Knowledge



It also outlines three types of hunts that can be conducted under these phases:


  • Hypothesis-Driven Threat Hunts

  • Baseline Threat Hunts

  • Model-Assisted Threat Hunts (M-ATH)


Hypothesis-Driven Threat Hunting


This approach starts by forming a logical hypothesis, such as:

“If adversaries are targeting remote access tools, then our organization may be at risk of RDP brute-force attacks using valid credentials.”

From there, the threat hunter investigates related indicators and behaviors in the environment.


Baseline Threat Hunting


Baseline threat hunting focuses on understanding what "normal" looks like in your environment, then identifying anomalies that could signal malicious activity. While establishing baselines is often one of the hardest to nail-down tasks in cybersecurity, it’s also one of the most valuable.


In practice, every threat hunt involves some form of implicit baselining. You’ve likely heard observations like, “This system talking to that system seems suspicious” or “This behavior is unusual for that endpoint.” These statements reflect a baseline, whether formally documented or informally understood.


True baseline threat hunting, however, takes this a step further. It involves explicitly defining expected behavior, such as:


  • System A should only communicate with System B over a specific port.

  • User accounts in Group X should never run administrative tools.

  • Workstations should not initiate outbound traffic to external IPs on non-standard ports.


Once these baselines are in place, the goal becomes clear: look for deviations that break the established norms. These deviations may indicate misconfigurations, insider threats, compromised assets, or shadow IT activity.


Model Assisted Threat Hunting


Model-Assisted Threat Hunting leverages machine learning and advanced analytics to identify anomalies or behavioral patterns that may signal malicious activity. This approach often involves building models that define what is considered "normal" or "malicious" behavior across systems, users, or network activity.


By using these models, threat hunters can proactively detect subtle indicators of compromise that might evade traditional rule-based detection. Some of the most widely used families of machine learning algorithms in this space include:


  • Classification - Classification algorithms are used to predict the category or class of a given data point (e.g., malicious vs. benign). These are typically supervised learning models trained on labeled datasets to recognize known patterns of good or bad behavior.

  • Clustering - Clustering groups similar data points together without prior labeling. It helps uncover hidden structures or relationships in the data. Different clustering algorithms use various methods to assess similarity and group data accordingly, making this approach effective for uncovering previously unknown threat patterns.

  • Time Series Analysis - Also known as forecasting, time series analysis involves analyzing sequences of data points collected over time. These algorithms are useful for identifying trends, seasonality, and sudden deviations that may suggest emerging threats or operational issues.

  • Anomaly Detection - Anomaly detection algorithms are designed to identify outliers, data points that deviate significantly from the norm. These can be statistical or machine learning-based and are effective in surfacing rare or unexpected behavior that may indicate compromise.


PEAK Threat Hunting – Scope and Planning


The PEAK threat hunting methodology incorporates the ABLE framework, which helps structure the investigative scope of a threat hunt.


ABLE stands for:


  • A – Actor

  • B – Behavior

  • L – Location

  • E – Evidence


The ABLE framework guides threat hunters in defining the core elements of the investigation. By identifying the threat actor (or suspected adversary), the behaviors associated with the threat, the systems or locations where those behaviors may occur, and the evidence required to confirm or refute the activity, hunters can more effectively focus their investigative efforts and define the scope of the threat hunt mission.


PEAK Threat Hunting – Execution


The Execution phase involves collecting, processing, and analyzing data relevant to the threat hunt hypothesis.


Data sources typically include SIEM telemetry, but may also incorporate additional sources such as endpoint telemetry, network logs, identity data, or other security platform data depending on the scope of the hunt.


During execution, threat hunters perform analytical activities including:


  • Query development and execution

  • Data correlation and filtering

  • Behavioral analysis

  • Data visualization

  • Pattern identification


All analytical techniques used during the hunt, such as queries, dashboards, and visualizations, should be documented for reproducibility and future reuse.


As the investigation progresses, findings may require refinement of the threat hunt hypothesis or expansion of the investigation scope. If evidence of potential malicious activity is identified, findings should be escalated to the appropriate incident response or SOC teams for further investigation.


PEAK Threat Hunting – Act


The Act phase focuses on operationalizing the results of the threat hunt.


Key activities include:


  • Preserving and documenting the threat hunt investigation, including queries, methodologies, and findings

  • Developing new detections or improving existing detections based on insights gained during the hunt

  • Updating the threat hunt backlog with new hypotheses or investigative opportunities identified during the mission

  • Communicating findings and analysis results to relevant stakeholders, including SOC teams, detection engineering teams, and leadership


This phase ensures that the knowledge gained from the threat hunt improves the organization’s long-term detection capabilities and overall security posture of the organization.


TaHiTI Threat Hunting Model


The Targeted Hunting Integrating Threat Intelligence (TaHiTI) model was developed by a consortium of Dutch financial institutions under the Dutch Payments Association (Betaalvereniging Nederland). Contributors included security professionals from de Volksbank, Rabobank, ING, ABN AMRO Bank, and members of FinancialCERT.


TaHiTI organizes the threat hunting process into three structured phases: Initiate, Hunt, and Finalize. One of the model’s key strengths is its grounding in real-world operational needs, particularly within large organizations.


TaHiTI - Phase 1: Initiate


The Initiate phase focuses on defining the reason and scope for the threat hunt. This begins with a trigger, which could come from executive directives, emerging threat intelligence, newly disclosed vulnerabilities, or recent incidents. In real-world environments, hunting teams often juggle requests from leadership while staying responsive to the latest threats.

To manage these demands effectively, TaHiTI encourages the creation of an investigation abstract, a concise, high-level summary that clearly communicates the rationale behind the hunt. This abstract becomes a crucial tool for aligning technical efforts with organizational priorities and maintaining transparency with stakeholders.


Another important aspect of this phase is prioritization. Not every trigger demands immediate action. The team must evaluate whether the new hunt should take precedence over existing efforts or be added to a backlog of scheduled threat hunts. Having a structured intake and prioritization process ensures resources are allocated where they can provide the most value.


The figure below categorizes common triggers that initiate threat hunting activities:


  • Threat Intelligence - Intelligence feeds are one of the most powerful sources for initiating threat hunts. Indicators of compromise (IOCs), adversary TTPs, and campaign reports can all highlight areas worth deeper investigation.

  • Ongoing Threat Hunts - Threat hunting can be recursive, findings from one hunt often uncover anomalies or patterns that spark new investigations. This iterative approach helps deepen threat visibility over time.

  • Security Monitoring - The TaHiTI model emphasizes strong integration with an organization’s security monitoring capabilities. Alerts, suspicious patterns, or telemetry gaps identified through SIEMs or EDR tools can all trigger targeted threat hunts.

  • Incident Response (IR) - Active incidents or red team exercises frequently expose blind spots or threat behaviors worth investigating further. These insights serve as rich sources for generating new hunt hypotheses.

  • Other Organizational Drivers - Several additional factors can trigger threat hunts, including:

    • Crown Jewel Analysis (protecting mission-critical assets)

    • Domain Expertise (knowledge from SMEs or SOC analysts)

    • MITRE ATT&CK Mapping (identifying gaps or TTP coverage)

    • Executive Directives (risk-based decisions from leadership)

    • Emerging Vulnerabilities and Exploits (new threats in the wild)


A well-structured threat hunt abstract helps ensure clarity, alignment, and traceability throughout the hunt lifecycle. The following components are essential:


  • Date - The date the abstract was created or the hunt was initiated.

  • Initial Hypothesis - A concise, testable hypothesis outlining the suspected threat or behavior being investigated.

  • Trigger - The event, intelligence, or insight that initiated the threat hunt. Include all relevant context and attach supporting artifacts (e.g., threat intel reports, detection alerts, IOC lists).

  • Hunt Priority - The urgency of the hunt, typically based on the potential threat level. Factors that influence priority may include:

    • Active threat campaigns targeting the organization or industry

    • Known adversary groups using relevant TTPs

    • Existing detection or prevention coverage

    • Observed exploitation in the wild


A clear and consistent abstract ensures stakeholders, technical and non-technical, can quickly understand the scope, rationale, and urgency of the threat hunt.


TaHiTI - Phase 2: Hunt


In the TaHiTI threat hunting model, Phase 2, the Hunt phase, consists of two closely integrated processes: Define/Refine and Execute.


Define/Refine involves expanding the initial threat hunt concept or abstract into a structured investigative plan. During this step, threat hunters enrich the original idea by incorporating relevant threat intelligence, defining or refining the investigative hypothesis, identifying the required data sources, and determining the analytical techniques that will be used during the hunt.


Once the hunt parameters are defined, the process moves into the Execute stage. During execution, analysts retrieve and analyze relevant telemetry to test and validate the hypothesis. This typically involves querying security data sources, correlating events, and examining behavioral patterns to determine whether evidence of the hypothesized activity exists.


The Define/Refine and Execute processes operate iteratively. As analysts analyze the data, new insights may emerge that require adjustments to the hypothesis, investigative scope, or analytical methods. When this occurs, the process cycles back to Define/Refine, where the hypothesis and investigation plan are updated before execution continues.


This iterative cycle continues until the hypothesis is validated, disproven, or the investigation reaches an acceptable level of analytical confidence.


TaHiTI - Phase 3: Finalize


One of the most impactful parts of the Finalize phase in a threat hunt is the handover, this is where the insights gained during the hunt are translated into actionable outcomes across the broader security organization. The handover is where threat hunting truly delivers its value.


Key Handover Areas:


  • Security Incident Response - If the hunt uncovered indicators of a real security incident, this information must be escalated immediately to the incident response team for containment, eradication, and recovery efforts.

  • Security Monitoring - Recommendations for improving detection should be passed to the security monitoring team. If new use cases or detection gaps were identified, provide actionable content, not vague suggestions commonly found in red team reports.

    • Don’t just say, “The organization needs better detection for attack XYZ.”

    • Instead, include detection logic, such as sample KQL queries or Sigma rules.

    • Also, evaluate and document false positive considerations to help the SOC tune these rules effectively.

  • Threat Intelligence - If the hunt revealed new Tactics, Techniques, or Procedures (TTPs) not previously documented, these should be integrated into the threat intelligence process. This keeps the organization’s CTI program current and relevant.

  • Vulnerability Management - If the hunt exposed exploitable misconfigurations, unpatched systems, or weak controls, hand these findings off to the vulnerability management or IT operations teams for remediation before attackers can take advantage.

  • Other Relevant Teams - Depending on the findings, there may be additional handovers to:

    • Network Security (e.g., for segmentation gaps)

    • Identity & Access Management (e.g., for privilege misuse)

    • Governance & Risk (e.g., if findings impact compliance posture)



Mitre Attack Framework


The MITRE ATT&CK framework organizes attacker behavior into:


  • Tactics – The adversary’s objective (e.g., Initial Access, Persistence, Command and Control)

  • Techniques – Methods used to achieve the tactic

  • Sub-techniques – Specific implementations of techniques


Threat hunters use ATT&CK to identify which adversary behaviors should be investigated within an environment.


Example:

ATT&CK Tactic

Example Technique

Threat Hunt Focus

Persistence

Registry Run Keys

Hunt for unusual registry persistence

Command & Control

Web Protocols

Hunt for suspicious outbound HTTP

Credential Access

LSASS Memory Dumping

Hunt for abnormal credential access activity

ATT&CK therefore acts as a behavioral library of attacker activity that threat hunters can investigate.


ATT&CK Drives Threat Hunt Hypothesis Creation


Many threat hunts begin with ATT&CK technique hypotheses.


Example hypothesis:

“If an attacker is attempting credential access using LSASS dumping (ATT&CK T1003), we should observe abnormal access to the LSASS process.”

The hunt then investigates telemetry such as:


  • Endpoint process access logs

  • EDR telemetry

  • Memory access patterns


Thus ATT&CK helps hunters move from abstract intelligence to concrete investigative queries.


ATT&CK Helps Map Data Sources


ATT&CK also provides guidance on data sources required to detect techniques, such as:


  • Process creation

  • Authentication logs

  • Network traffic

  • Registry activity


Threat hunting frameworks use this mapping to determine which telemetry should be queried during the hunt.


ATT&CK Enables Detection Gap Analysis


Another major relationship between ATT&CK and threat hunting frameworks is detection coverage analysis.


Threat hunters often perform: ATT&CK coverage mapping


Example:

Technique

Detection Coverage

Threat Hunt Need

PowerShell execution

Partial

Conduct hunt

Scheduled task persistence

None

High-priority hunt

WMI lateral movement

Strong

Monitor

Threat hunts are often launched specifically to validate coverage gaps identified in ATT&CK mappings.


ATT&CK Supports Detection Engineering After Hunts


After a threat hunt completes, findings are frequently converted into ATT&CK-mapped detections.


Example:


  • Threat Hunt Finding→ suspicious certutil download behavior

  • Detection created→ ATT&CK technique: Ingress Tool Transfer


This allows security programs to measure detection maturity against the ATT&CK framework.


ATT&CK Enables Threat Actor-Based Hunting


Many threat intelligence reports map threat actors to ATT&CK techniques.


Example mapping:


  • Threat Actor→ Techniques used→ Threat hunt targets

  • Threat hunters can then search for those specific behaviors in their environment.

  • This approach is commonly called ATT&CK-based threat hunting.


References


PEAK Threat Hunting Framework:


The PEAK Threat Hunting Template You'll Wish You Had Sooner


Tahiti Threat Hunting Model:


𝗔𝗧𝗧&𝗖𝗞 - Adversary TTPs - attack.mitre.org


𝗗𝟯𝗙𝗘𝗡𝗗 - Defensive Countermeasures - d3fend.mitre.org


𝗥𝗘&𝗖𝗧 - Incident Response - https://atc-project.github.io/react-navigator/


𝗘𝗡𝗚𝗔𝗚𝗘 - Deception & Engagement - https://engage.mitre.org/matrix/


𝗔𝗧𝗟𝗔𝗦 - AI/ML Security - https://atlas.mitre.org/matrices/ATLAS


𝗘𝗠𝗕𝟯𝗗 - Embedded Device Security - emb3d.mitre.org


𝗙𝗶𝗚𝗛𝗧 - 5G Infrastructure - fight.mitre.org


𝗖𝗥𝗘𝗙 - Cyber Resiliency - https://crefnavigator.mitre.org/navigator



 
 
 

Recent Posts

See All

Comments


Post: Blog2_Post
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page