Mindset of Threat Hunting: Questions to Ask Yourself
- What are the possible implications of this TTP?
- Consider how this tactic, technique, or procedure could impact the organization or systems.
- How could this TTP be chained with other techniques?
- Analyze how attackers might combine this TTP with others to enhance their attack strategies.
- Are there any related TTPs or tactics that I should be aware of?
- Identify additional techniques that are associated or commonly used alongside this TTP.
- What indicators or artifacts might be associated with this TTP?
- Determine the signs, logs, or forensic evidence that this TTP might leave behind.
- How would an attacker leverage this TTP in a real-world scenario?
- Understand the practical application of this TTP from an attacker's perspective.
- Are there any defensive measures or mitigations to counteract this TTP?
- Explore existing security controls or strategies that can detect or prevent this TTP.
- What are the potential blind spots or gaps in detection for this TTP?
- Identify areas where current monitoring may be insufficient to detect this activity.
- How can I proactively hunt for evidence of this TTP in my environment?
- Plan methods and tools to search for signs of this TTP within your systems and networks.
- What data sources or logs should I review to detect this TTP?
- List specific logs, alerts, or data repositories that could contain relevant information.
- Are there any deviations from normal behavior that might indicate exploitation of this TTP?
- Look for anomalies or unusual patterns that could signal the TTP is being exploited.