How To Start Threat Hunting: The Beginner's Guide

Quickly observing your surroundings, orienting yourself based on those observations, and acting upon them is an essential skill — both in cybersecurity and in life.

Whenever you start hunting in a new environment, you’ll want to get used to it first, before you begin your hunt. So, in this tutorial, we explore the wild world of hunting threats in a new environment.

Whether you hunt daily or are just getting started, you’ll get some excellent threat hunting tips and tricks here. This article is organized into four sections:

For this Splunky tutorial, we're making the wild assumption that your data is already in Splunk. There are many articles written about getting data into Splunk, so this is focused on the analyst getting information back OUT.

(Part of our Threat Hunting with Splunk series, this article was originally written by John Stoner. We’ve updated it recently to maximize your value.)

Step 1. Starting the hunt process

When you're starting a hunt, it's important to have a clear objective in mind. To help figure out what and where you should be hunting, we suggest a couple paths forward:

If I can hypothesize, for example, that PowerShell is running on my Windows systems, that provides a focus for my hunt — that way I won’t get caught looking at other bright shiny objects.

Of course, if/when you do find other bright shiny objects during your hunt, take note of them and then use them to build hypotheses for subsequent hunts.

(Don't need a hands-on tutorial? Check out this threat hunting introduction.)

Step 2. Focusing your hunt

When I look at my Splunk console, I may have hundreds of data sources (“sourcetypes”) stretching over days, weeks, months or years.

One of the first steps I need to take is narrowing down this extensive scope of data and time to a more specific range or subset. That doesn’t mean I won’t need to pivot back to a broader search, but to be effective, I need to start narrowing my focus.

How do we focus? Let’s start with time.

Time

On the right side of my Splunk search bar, a drop-down known as the Time Picker allows me to set the time range that the search will run within. Clicking on the drop-down returns a number of time presets, as well as the ability to search specific data and time ranges. The use of Time Picker in searches is incredibly important during any hunt.

To effectively focus on specific data sources — sourcetypes — I need to understand what sourcetypes are available. To quickly determine the sourcetypes available, I can use the metadata command like this:

| metadata type=sourcetypes | sort - totalCount

My search provides a list of:

(For more information on this search, check out Using metadata & tstats for Threat Hunting.)

Data sources

Now that I have a hypothesis (or a question to answer), a time boundary, and sourcetypes, I can start digging into the data. What kind of data should I focus on? It will depend on the hypothesis or question being asked.

Network data sources can help me determine what data was sent and in which direction. Understanding if data is flowing to my cloud provider or from my servers to my workstations are important pieces of information to gather.

Network data sources can include:

Wire data can be seen in the form of Splunk for Stream which is broken out by network protocols including TCP, HTTP, SMTP, DNS and many more.

Your organization may not be running Splunk for Stream, but you may have PCAP data or Zeek, and these data sets can provide other valuable insight into the specific protocols operating on your network.

(Related reading: Using Splunk Stream for hunting.)

Context

In addition to log events, I want contextual data to better understand the network, systems and users. Here are other types of data you may want to consider:

Step 3. Searching in Splunk

Now that we have data, context, and the ability to narrow our time frame, let’s look at Splunk searches. I can execute unstructured or structured searches in Splunk and get results.

Unless I know precisely what I'm looking for when hunting, I want to initially make my search broad for the following reasons:

In this example, we're searching for events on August 23, 2017, and searching our Microsoft Sysmon data. (Yes, we recognize that this data is older — fortunately, the content and lessons learned here are still very relevant.)

sourcetype="xmlwineventlog:microsoft-windows-sysmon/operational"

My search returns over 40,000 events! But by using the fields available to me, I can narrow my search dramatically if I'm hunting for an activity that Amber Turing is performing. I can do this on multiple fields just by pointing and clicking!

sourcetype="xmlwineventlog:microsoft-windows-sysmon/operational" user="FROTHLY\\amber.turing"

From my results, I can see that Amber seems to be running tor.exe on her system. Interesting. Now, I can start using the awesome Splunk transforming commands to finesse my data.

What's a transforming command? These are commands that take the output of a search and transform the data output…:

Helpful command references

Splunk publishes a helpful command reference — which I always keep near — that you should leverage during your hunts! (If you aren’t familiar with the commands in Splunk and you generally use keywords for searching, no worries: this threat hunting series has you covered.)

That said, if I was stuck on a desert island with only two Splunk commands, I would start with stats and eval because they're so powerful. Here's an example of using both of them in concert with one another.

sourcetype="pan:traffic" (src_ip=10.0.2.101 OR dest_ip=10.0.2.101)
| stats count AS event_count sum(bytes_in) AS bytes_in sum(bytes_out) AS bytes_out sum(bytes) as bytes_total by src_ip dest_ip
| eval mb_in=round((bytes_in/1024/1024),2)  | eval mb_out=round((bytes_out/1024/1024),2) | eval mb_total=round((bytes_total/1024/1024),2)
| fields - bytes*
| sort - mb_total
| head 10

In this example, I want to see what communication paths existed between Amber’s system and other systems. Because I have contextual information, I know her IP address is 10.0.2.101 and so my initial search is looking at the firewall data with her IP address being either the source or destination:

I could stop there because I said those two commands were my favorites, but I'll throw a few extra commands in to show you what I can do from there:

With that, I have a top 10 talkers list between a system of interest and the rest of the world. Pretty cool, huh?

Step 4. Using OSINT & other resources

The last important component to keep in mind when going hunting is OSINT — open source intelligence. (Check out this quick introduction to OSINT from this hunting series.)

My favorite OSINT site starts with the letter G. Anyone? That’s right, it’s google.com.

Google is an often-underused weapon when hunting. I don’t know about you, but I just can’t seem to remember all 1000+ Windows Event codes, so being able to quickly search for this kind of information is invaluable.

After Google, here are other sites I find helpful:

Continuing the hunt

Wow, we covered a lot of new ground in a short time! If you're interested in hunting on some datasets to keep your skills sharp, try out some new techniques, or just practice your Splunk search skills, you can head to the Splunk GitHub and download BOTS datasets (for example botsv3) to use in your own sandbox environment.

And you’ve got plenty more tutorials in this series to explore, too.

As always, happy hunting!

Related Articles

Detecting Ryuk Using Splunk Attack Range
Security
6 Minute Read

Detecting Ryuk Using Splunk Attack Range

A new alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, issued by the CISA poses ongoing and possible imminent attacks against the healthcare sector. Learn how you can detect the Ryuk ransomware as payload with Splunk Attack Range.
Detecting Google Cloud Platform OAuth Token Abuse Using Splunk
Security
5 Minute Read

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range
Security
5 Minute Read

Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range

Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched or lack mitigations in place. Learn how to prevent and detect CVE-2020-1472 using Splunk Attack Range.
Adaptable Incident Response With Splunk Phantom Modular Workbooks
Security
5 Minute Read

Adaptable Incident Response With Splunk Phantom Modular Workbooks

Modular Workbooks allow you to effortlessly adapt your security operations workflow. Learn how Splunk Phantom SOAR can help divide tasks into phases, assign responsibilities to team members, and document your work.
Introducing a New Splunk Add-On for OT Security
Security
2 Minute Read

Introducing a New Splunk Add-On for OT Security

The Splunk Add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments for our customers, partners and community members.
Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials
Security
7 Minute Read

Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials

In this blog, the Splunk threat research team shows how to detect suspicious activity and possible abuse of AWS Permanent and Temporary credentials.
CI/CD Detection Engineering: Splunk's Attack Range, Part 2
Security
7 Minute Read

CI/CD Detection Engineering: Splunk's Attack Range, Part 2

In part 2 of our 3-part series, we walk you through how to use Splunk Security-Content, Attack Range and CircleCI to do detection development, continuous testing and deployment as a workflow in your SOC.
CI/CD Detection Engineering: Splunk's Security Content, Part 1
Security
8 Minute Read

CI/CD Detection Engineering: Splunk's Security Content, Part 1

This blog is part 1 of a 3 part series that includes a step-by-step walk-through of how to use Splunk Security-Content, Attack Range and CircleCI to do detection development, continuous testing, and deployment as a workflow in your security operation center.
Nation-State Espionage Targeting COVID-19 Vaccine Development Firms - The Actions Security Teams Need To Take Now!
Security
2 Minute Read

Nation-State Espionage Targeting COVID-19 Vaccine Development Firms - The Actions Security Teams Need To Take Now!

The UK NCSC published an advisory report that threat group APT29 most recently targeted organizations which are involved in COVID-19 vaccines development and testing. Find out if your organization is affected and which actions you need to take now.