You are on page 1of 1

THREAT HUNTING WORKSHEET

Name:
Date:

Kill Chain Analysis


Reconnaissance (Targeted System)
Patient Zero: System and User Information
Computer Name: Logged-in Username:
Operating System: MAC Address:
Vulnerable Applications: Host IP Address(es):

Delivery
Attacker Infrastructure and Dropper File
Malicious Domains: IP Addresses:
Dropper File Name: Dropper File Type:

Exploitation
Infection Vector
☐ Email: Attachment ☐ Web: Phishing Link ☐ Active Exploitation
☐ Email: Phishing Link ☐ Web: Exploit Kit ☐ Other:

Installation
Malware Binary
File Name: File Type:
Malware Family Name:

Command and Control


Command and Control (C2) Communications
Domains Contacted: IPs Contacted:
URLs Contacted:

Actions on Objective
Threat Behavior
☐ Process injection detected? (if so, which process)
☐ Escalation of privileges detected? (if so, which method)
☐ PowerShell / scripting commands detected? (if so, list)
Known Malware Capabilities:

Executive Summary
Date/Time of Patient Zero initial infection:
Total number of systems affected:
Timeline:

Security recommendations:

Sponsored by the Cisco Advanced Threat Solutions team and Cisco Incident Response Services. For assistance with an ongoing breach, contact
IncidentResponse@cisco.com or call 1-844-831-7715.

You might also like