Skip to main content

Hunting Hypothesis Template

Purpose

Create falsifiable hunt plans from CTI claims.

Fields

  • hunt_id: Unique hunt identifier.
  • hypothesis: If/then behavior statement.
  • source_claim: Claim and source backing the hunt.
  • telemetry: Required tables/logs.
  • fields: Required fields.
  • lookback: Search period.
  • malicious_pattern: Expected suspicious behavior.
  • benign_pattern: Expected legitimate pattern.
  • false_positives: Likely benign sources.
  • escalation: When to open incident or case.

Example Values

hunt_id: HUNT-011
hypothesis: If phishing leads to script execution, then endpoints receiving suspicious mail may spawn script interpreters within 24 hours.
source_claim: EV-009
telemetry: Email gateway, EDR process, network logs
fields: recipient, attachment, process, command line, destination
lookback: 30 days
false_positives: IT automation, software installers
escalation: Script execution plus unknown external download.

Quality Gates

  • Hypothesis is falsifiable.
  • Telemetry and fields are listed.
  • False positives are named.
  • Stop condition exists.

Common Failure Modes

  • Keyword search disguised as a hunt.
  • No benign baseline.
  • No escalation path.

Practical Workflow

  1. Create the artifact only after the intelligence requirement or decision is clear.
  2. Fill required fields before writing narrative prose.
  3. Attach evidence labels, source references, confidence, and limitations.
  4. Review with the intended consumer.
  5. Update the artifact when evidence, telemetry, or decision context changes.

Analyst Checklist

  • Is the consumer defined?
  • Are required fields complete?
  • Are claims source-backed or marked Gap?
  • Is confidence justified?
  • Are limitations explicit?
  • Is there a next action or owner?

References

Required vs Optional Fields

Required: hypothesis, source claim, telemetry, fields, lookback, malicious pattern, benign pattern, false positives, escalation threshold, stop condition.

Optional: ATT&CK mapping, query draft, reviewer, pilot notes.

Pass / Fail Example

Pass: Hypothesis is falsifiable and names both malicious and benign patterns.

Fail: Hypothesis is a keyword search with no stop condition.

Complete Filled Example

hunt_id: HUNT-RMM-001
hypothesis: If unauthorized RMM is used after initial access, then a non-IT host will show new RMM install plus external remote session without a change ticket.
source_claim: EV-RMM-001
telemetry: EDR process, software inventory, network, identity, ticketing
fields: host, user, process, command_line, destination, ticket_id
lookback: 30 days
malicious_pattern: New RMM install on non-IT host plus external session.
benign_pattern: Approved helpdesk deployment with ticket and known admin user.
false_positives: Vendor support, helpdesk, migrations.
escalation: No ticket plus suspicious pre-install email or external source.
stop_condition: All hits explained by approved deployment records.