Threat Hunting

Put on your investigative hats, this week we will be exploring finding mallory! 🕵️‍♀️


There are three main types of hunts:

In this tutorial we will focus on Hypothesis driven hunt!

Hypothesis Driven Hunt


We begin by considering what Mallory might do within a victim network (building a hypothesis) and then we would test the hypothesis (given we have the data sources) by searching for evidence of the hypothetical behavior within the network. Eventually we would build alerts that will trigger when a future occurrence of a behavior occurs in the future!

What might Mallory do?


The Mitre Att&ck Framework is a catalogue of adversarial Techniques, Tactic and Procedures (a.k.a TTPs). This framework aids defenders in describing adversarial activity concisely, model detections and test security controls to name a few.

Discussion Q1

Defensive security professionals (Defenders) create adversary profiles based on observed threat activity. Example: Advanced Persistent Threat - 29 (APT 29) a.k.a Cozy Bear.

In a hypothetical hunt, the hunter assumes compromise and hunts for evidence of one or more TTPs on the endpoint or network.

Our Hypothesis


Bank of Fail is major player in the financial industry, customer data security is a core business pillar. Recently threat actor D27-F22 (Mallory’s fancy APT name), has been observed to compromise other banks in the region within the last six months.

This threat actor is known to leverage

Hypothetically, Bank of Fail may have also be compromised. As a threat hunter, the organization is looking to your team to confirm or debunk this hypothesis

The hunt


Hunting details may vary slightly based on the type of hunt. However, it basically involves

You should refer to Mitre Att&ck Framework to inform your reasoning in the following discussion topics

Discussion Q2

Discussion Q3

Discussion Q4

Discussion Q5