CyberDax Detection Companion

Report Type
Training

Purpose‍ ‍

This companion guide provides a structured framework for translating behavioral threat hunting into detection-oriented thinking.

‍ ‍

‍ ‍

It is designed to answer four critical questions:

‍ ‍

·        What behavior should be detectable

‍ ‍

·        What observable signals may expose that behavior

‍ ‍

·        What telemetry sources are required to observe those signals

‍ ‍

·        What type of detection approach is most appropriate

‍ ‍

‍ ‍

This is not a production detection guide.
It is a behavioral detection mapping guide designed to improve analytical clarity and detection strategy.

‍ ‍

Why This Companion Exists

‍ ‍

Heuristic threat hunting teaches analysts how to recognize suspicious behavior.
The next logical step is understanding how that behavior could be identified more consistently.

‍ ‍

This companion bridges the gap between:

‍ ‍

·        behavior-first analysis

‍ ‍

·        detection-oriented reasoning

‍ ‍

It does not provide deployable detections.
It provides the structure required to think clearly about detection opportunities and limitations.

‍ ‍

Core Detection Philosophy

‍ ‍

CyberDax detection philosophy follows a simple model:

‍ ‍

Behavior creates signals.
Signals require telemetry.
Telemetry enables detection.

‍ ‍

Detection should begin with attacker behavior, not tools, signatures, or indicators.

‍ ‍

The question is not:

‍ ‍

What signature can be written for this tool

‍ ‍

The correct question is:

‍ ‍

What must the attacker do, and what evidence does that activity create

‍ ‍

Detection Mapping Model

‍ ‍

Detection is mapped conceptually through four layers.

‍ ‍

Behavior

‍ ‍

The action performed by the attacker.

‍ ‍

Examples include:

‍ ‍

·        execution of code

‍ ‍

·        credential access

‍ ‍

·        persistence establishment

‍ ‍

·        external communication

‍ ‍

·        data staging or exfiltration

‍ ‍

Signal

‍ ‍

A signal is any observable event or pattern that may indicate behavior inconsistent with expected system or user activity.

‍ ‍

Signals represent evidence that behavior has occurred.

‍ ‍

‍ ‍

Examples include:

‍ ‍

·        abnormal parent-child process relationships

‍ ‍

·        encoded or obfuscated execution

‍ ‍

·        access to sensitive memory or token stores

‍ ‍

·        rare or first-seen outbound connections

‍ ‍

·        archive creation followed by transfer activity

‍ ‍

Telemetry

‍ ‍

The data sources required to observe signals.

‍ ‍

Examples include:

‍ ‍

·        endpoint process telemetry

‍ ‍

·        authentication and identity logs

‍ ‍

·        DNS activity

‍ ‍

·        proxy or network traffic

‍ ‍

·        email and user interaction telemetry

‍ ‍

Detection Approach

‍ ‍

The general method used to identify suspicious activity.

‍ ‍

Examples include:

‍ ‍

·        single-event alerting

‍ ‍

·        contextual analytics

‍ ‍

·        correlated behavioral detection

‍ ‍

·        hunt-only logic

‍ ‍

·        enrichment-supported triage

‍ ‍

Detection Approach Types

‍ ‍

Different behaviors require different detection strategies.

‍ ‍

Single-Event Detection

‍ ‍

Used when:

‍ ‍

·        the behavior is rare

‍ ‍

·        the behavior is high-confidence

‍ ‍

·        false positive risk is low

‍ ‍

Example:

‍ ‍

·        unauthorized access to protected credential stores

‍ ‍

‍ ‍

This approach is appropriate when a single event is sufficient to justify investigation.

‍ ‍

Contextual Detection

‍ ‍

Used when:

‍ ‍

·        the event alone is not sufficient

‍ ‍

·        legitimacy depends on user, system, or environment

‍ ‍

Example:

‍ ‍

·        administrative tool execution on a non-administrative system

‍ ‍

This approach requires contextual understanding rather than simple matching.

‍ ‍

Correlated Detection

‍ ‍

Used when:

‍ ‍

·        multiple low-confidence signals form a pattern

‍ ‍

·        activity spans multiple systems or telemetry sources

‍ ‍

·        no single event is sufficient

‍ ‍

Example:

‍ ‍

·        document execution followed by script execution and external communication

‍ ‍

‍ ‍

This is often the most effective approach for modern threat activity.

‍ ‍

This approach scales because it prioritizes patterns of behavior rather than individual events, allowing analysts to focus on high-risk activity without reviewing all telemetry.

‍ ‍

Hunt-Only Detection

‍ ‍

Used when:

‍ ‍

·        signals are too noisy for alerting

‍ ‍

·        confidence is insufficient for automated escalation

‍ ‍

·        interpretation depends heavily on environment

‍ ‍

‍ ‍

Example:

‍ ‍

·        uncommon but potentially legitimate command-line variations

‍ ‍

Hunt-only logic remains valuable.
Not all detection logic should generate alerts.

‍ ‍

Telemetry Prioritization Model

‍ ‍

Certain telemetry sources consistently provide higher detection value for behavioral analysis.

‍ ‍

Entry Telemetry

‍ ‍

Includes:

‍ ‍

·        email delivery and interaction

‍ ‍

·        link access

‍ ‍

·        file delivery and execution

‍ ‍

This provides context for how activity originated.

‍ ‍

Execution Telemetry

‍ ‍

Includes:

‍ ‍

·        process creation

‍ ‍

·        command-line activity

‍ ‍

·        script execution

‍ ‍

·        parent-child relationships

‍ ‍

·        memory interaction behavior

‍ ‍

Execution telemetry is often the most critical because attackers must execute code to achieve objectives.

‍ ‍

Communication Telemetry

‍ ‍

Includes:

‍ ‍

·        DNS activity

‍ ‍

·        proxy traffic

‍ ‍

·        outbound connections

‍ ‍

·        rare or first-seen destinations

‍ ‍

This provides validation of external interaction following execution.

‍ ‍

Telemetry Correlation Principle

‍ ‍

Detection strength increases when telemetry spans:

‍ ‍

·        how activity started

‍ ‍

·        what executed

‍ ‍

·        what communicated

‍ ‍

Single-source detection provides limited visibility.
Multi-source correlation provides higher confidence.

‍ ‍

Behavior-to-Detection Examples

‍ ‍

Behavior reveals what attackers must do to succeed.

‍ ‍

The following are conceptual examples.
They are not production detections.

‍ ‍

Suspicious Document-Led Execution

‍ ‍

Behavior
A user-facing document triggers script or command execution.

‍ ‍

Signals

‍ ‍

·        Office application spawning a script interpreter

‍ ‍

·        unusual or encoded command-line content

‍ ‍

·        execution shortly after document interaction

‍ ‍

Telemetry

‍ ‍

·        endpoint process telemetry

‍ ‍

·        email and user interaction logs

‍ ‍

Detection Approach
Correlated or contextual detection

‍ ‍

Explanation
The parent-child relationship may be suspicious, but confidence increases when tied to user interaction and subsequent activity.

‍ ‍

Suspicious External Communication

‍ ‍

Behavior
A process initiates communication with an unusual or low-frequency external destination.

‍ ‍

Signals

‍ ‍

·        rare domain resolution

‍ ‍

·        first-seen destination

‍ ‍

·        process-linked outbound communication

‍ ‍

Telemetry

‍ ‍

·        DNS logs

‍ ‍

·        proxy logs

‍ ‍

·        endpoint network telemetry

‍ ‍

Detection Approach
Contextual or correlated detection

‍ ‍

Explanation
Infrastructure alone is often insufficient. Confidence increases when combined with suspicious execution.

‍ ‍

Credential Access Behavior

‍ ‍

Behavior
A process accesses credentials, tokens, or protected authentication material.

‍ ‍

Signals

‍ ‍

·        access to sensitive memory or token stores

‍ ‍

·        behavior inconsistent with process function

‍ ‍

·        follow-on authentication anomalies

‍ ‍

Telemetry

‍ ‍

·        endpoint telemetry

‍ ‍

·        authentication logs

‍ ‍

Detection Approach
Single-event or correlated detection depending on context

‍ ‍

Explanation
Confidence depends on process legitimacy and subsequent activity.

‍ ‍

Staging and Exfiltration Behavior

‍ ‍

Behavior
Data is collected, compressed, or packaged before transfer.

‍ ‍

Signals

‍ ‍

·        archive creation

‍ ‍

·        staging in unusual locations

‍ ‍

·        outbound transfer following staging

‍ ‍

Telemetry

‍ ‍

·        file activity

‍ ‍

·        endpoint telemetry

‍ ‍

·        network or proxy logs

‍ ‍

Detection Approach
Correlated detection

‍ ‍

Explanation
Individual actions may be benign. The sequence creates confidence.

‍ ‍

Detection Design Questions

‍ ‍

Before designing any detection, analysts must evaluate:

‍ ‍

·        What behavior is being identified

‍ ‍

·        What observable signal indicates that behavior

‍ ‍

·        What telemetry is required to detect it

‍ ‍

·        Whether a single event is sufficient or correlation is required

‍ ‍

·        What legitimate activity may appear similar

‍ ‍

·        Whether the detection should alert, enrich, correlate, or support hunting

‍ ‍

This approach does not require investigation of all low-signal activity.
It prioritizes escalation based on correlated behavior, allowing analysts to reduce missed detections without increasing overall investigation volume.

‍ ‍

What This Companion Does Not Provide

‍ ‍

This document does not include:

‍ ‍

·        production-ready detection rules

‍ ‍

·        thresholds or tuning logic

‍ ‍

·        alert suppression strategies

‍ ‍

·        platform-specific implementations

‍ ‍

·        correlation timing or sequencing logic

‍ ‍

These elements require environment-specific engineering and operational validation.

‍ ‍

Practical Use of This Companion

‍ ‍

This guide should be used to:

‍ ‍

·        support detection planning

‍ ‍

·        improve analyst reasoning

‍ ‍

·        identify telemetry gaps

‍ ‍

·        determine appropriate detection approaches

‍ ‍

·        distinguish between alertable and hunt-only behavior

‍ ‍

It is not a replacement for detection engineering.

‍ ‍

Strategic Value

‍ ‍

Behavior-first detection mapping shifts the focus from:

‍ ‍

Do we have an indicator for this activity

‍ ‍

to:

‍ ‍

Would we observe this behavior if it occurred in this environment

‍ ‍

This results in more durable and effective detection coverage.

‍ ‍

Final Principle

‍ ‍

Indicators confirm what is already known.

‍ ‍

Behavior reveals what attackers must do to succeed.

‍ ‍

Behavior evolves more slowly than indicators and is constrained by the actions attackers must perform.

‍ ‍

Detection strategies are most effective when they focus on behavior that cannot be easily changed.

‍ ‍

Next
Next

CyberDax Heuristic Threat Hunting Foundations