Skip to content

Latest commit

 

History

History
189 lines (159 loc) · 5.94 KB

Resources.md

File metadata and controls

189 lines (159 loc) · 5.94 KB

🪵 Resources for Threat Hunting

Overview

Before submitting a hunt to HEARTH, it's valuable to gather intelligence and inspiration from various sources. This guide provides resources and methods for developing threat hunting ideas.

Intelligence Sources

1. Threat Intelligence Platforms

  • MITRE ATT&CK
    • Browse tactics and techniques
    • Study documented adversary behaviors
    • Review procedure examples
  • CISA Alerts
    • Recent vulnerability announcements
    • Threat actor TTPs
    • Incident reports
  • Industry ISACs
    • Sector-specific threats
    • Emerging attack patterns
    • Shared intelligence reports

2. Security Research

  • Academic Papers
  • Security Blogs
    • Vendor security blogs
    • Independent researchers
    • Threat Research teams
  • Conference Materials
    • BlackHat presentations
    • DEF CON talks
    • BSides talks
    • Other conference presentations (use Google or check YouTube)

3. Community Resources

  • Twitter/X Security Community
    • Follow threat researchers
    • Track #infosec and #threathunting tags
    • Monitor vendor security accounts
  • GitHub Repositories
    • Detection rules repositories
    • Threat hunting tools
    • Attack simulation projects
  • Security Forums

Resource Directory

Threat Research Blogs

Frameworks and Playbooks

Threat Intelligence Resources

Documentation Resources

Idea Development Methods

1. Current Events Analysis

  • Monitor news for security incidents
  • Study published incident reports
  • Review disclosed vulnerabilities
  • Track threat actor campaigns

2. Internal Intelligence

  • Review past security incidents
  • Analyze failed attack attempts
  • Study successful compromises
  • Examine detection gaps

3. Data-Driven Approach

  • Audit available data sources
  • Identify unexplored data sets
  • Review logging coverage
  • Map detection capabilities

Idea Refinement Process

1. Initial Capture

  • Document basic concept
  • Note relevant data sources
  • List potential techniques
  • Record references

2. Research Phase

  • Gather supporting evidence
  • Find similar approaches
  • Document limitations
  • Identify requirements

3. Validation Questions

  • Is the idea testable?
  • Are data sources available?
  • What tools are needed?
  • Is it practically implementable?

Converting to HEARTH Submission

1. Determine Hunt Type

  • Flames (Hypothesis-Driven)
    • Clear adversary behavior
    • Specific activity patterns
    • Testable hypothesis
  • Embers (Baseline)
    • Normal behavior patterns
    • Environmental baselines
    • Deviation detection
  • Alchemy (Model-Assisted)
    • Algorithm requirements
    • Data science approach
    • Pattern recognition

2. Documentation Requirements

  • Complete hypothesis statement
  • Supporting references
  • Implementation details
  • Required resources

3. Submission Preparation

  • Use official template
  • Include all references
  • Document assumptions
  • Note limitations

Tips for Success

  1. Start Small

    • Focus on specific behaviors
    • Limit initial scope
    • Build on basics
  2. Validate Feasibility

    • Check data availability
    • Verify tool access
    • Test basic concepts
  3. Document Everything

    • Record sources
    • Note decisions
    • Track changes
    • Save references
  4. Seek Feedback

    • Share early drafts
    • Request peer review
    • Incorporate suggestions
    • Iterate based on input

Remember: The best hunt ideas often start as simple observations or questions. Use this guide to help develop your initial concepts into full-fledged HEARTH submissions.