Mindset of Threat Hunting: Questions to Ask Yourself

  1. What are the possible implications of this TTP?
  2. How could this TTP be chained with other techniques?
  3. Are there any related TTPs or tactics that I should be aware of?
  4. What indicators or artifacts might be associated with this TTP?
  5. How would an attacker leverage this TTP in a real-world scenario?
  6. Are there any defensive measures or mitigations to counteract this TTP?
  7. What are the potential blind spots or gaps in detection for this TTP?
  8. How can I proactively hunt for evidence of this TTP in my environment?
  9. What data sources or logs should I review to detect this TTP?
  10. Are there any deviations from normal behavior that might indicate exploitation of this TTP?