The host-side companion to the network threat hunt reference. Where the network reference covers what adversaries do across the wire, this site covers what they do inside the endpoint: process execution, persistence, privilege escalation, host-side credential theft.
Each indicator includes Sysmon Event IDs, paste-ready Kibana KQL, PowerShell hunt scripts, registry/file artifacts, adversary tool attribution, and references to open-source detection projects (Sigma, Velociraptor, Hayabusa, etc.).
The host schema differs from network because host telemetry has more dimensions. Same indicator can have evidence in: process events (Sysmon EID 1), registry modifications (EID 12/13), file creation (EID 11), network connections from process (EID 3), image loads (EID 7), and process access (EID 10).
PowerShell hunt scripts are designed to run directly against Windows event logs - useful for both proactive hunting and during incident response when you need to triage without a SIEM.
Currently building Execution (TA0002): 1 of 13 techniques fully built (T1059.001 PowerShell with 4 indicators). Remaining 12 techniques in Execution are stubbed and will be filled out in future sessions.
Tactic build order:
→Execution
→Persistence
→Defense Evasion
→Privilege Escalation
→Credential Access
→Discovery
then completionist coverage of the rest.