This paper is focused on the various ways in which threat
hunting can be performed. It is based on the author's research of
semi-automating the entire process by creating a tool based on
machine learning and applying analytics.
Read more https://packetstormsecurity.com/files/162850/the_game_of_threat_hunting.pdf