agentic-threat-hunting-framework 0.3.1__py3-none-any.whl → 0.4.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -191,14 +191,25 @@ The repository includes [knowledge/hunting-knowledge.md](../knowledge/hunting-kn
191
191
 
192
192
  **No changes needed** - this file provides universal hunting expertise that AI assistants will apply to your environment.
193
193
 
194
- ### Test AI Integration
194
+ ### Test AI Integration and Agent Framework (v0.3.0+)
195
195
 
196
196
  1. Open your repository in Claude Code, GitHub Copilot, or Cursor
197
197
  2. Ask: "What hunts have we documented?"
198
198
  3. Ask: "What data sources do we have for Windows endpoint hunting?"
199
- 4. Ask: "Generate a hypothesis for T1003.001 LSASS dumping"
199
+ 4. Try the agent framework:
200
+ ```bash
201
+ # List available agents
202
+ athf agent list
203
+
204
+ # Generate a hypothesis using the hypothesis-generator agent
205
+ athf agent run hypothesis-generator \
206
+ --threat-intel "APT29 using LSASS dumping for credential theft"
200
207
 
201
- If the AI can answer these questions using your repository context, you're successfully at Level 2!
208
+ # Conduct pre-hunt research
209
+ athf research new --topic "LSASS dumping" --technique T1003.001
210
+ ```
211
+
212
+ If the AI can answer these questions and the agent commands work, you're successfully at Level 2!
202
213
 
203
214
  **Time investment:** Approximately 1 week to customize AGENTS.md and test AI integration.
204
215
 
@@ -332,12 +343,45 @@ Don't build a full agent pipeline on day one:
332
343
 
333
344
  If you installed the CLI (Option A), here are the most useful commands:
334
345
 
346
+ ### Agent Framework (v0.3.0+)
347
+
348
+ ```bash
349
+ # List all available agents
350
+ athf agent list
351
+
352
+ # Get details about a specific agent
353
+ athf agent info hypothesis-generator
354
+
355
+ # Run an agent
356
+ athf agent run hypothesis-generator --threat-intel "APT29 using WMI"
357
+ athf agent run context-loader --hunt H-0013
358
+ athf agent run similarity-scorer --query "password spraying"
359
+ ```
360
+
361
+ ### Research Workflow (v0.3.0+)
362
+
363
+ ```bash
364
+ # Create research document (15-20 min deep research)
365
+ athf research new --topic "LSASS dumping" --technique T1003.001
366
+
367
+ # Quick research for urgent hunts (5 min)
368
+ athf research new --topic "Pass-the-Hash" --depth basic
369
+
370
+ # List and view research
371
+ athf research list
372
+ athf research view R-0001
373
+ ```
374
+
335
375
  ### Hunt Management
336
376
 
337
377
  ```bash
338
378
  # Create hunts
339
379
  athf hunt new # Interactive mode
340
380
  athf hunt new --technique T1003.001 --title "LSASS Dumping"
381
+ athf hunt new --research R-0001 # Link to research document
382
+
383
+ # Execute hunt workflow with agents (v0.3.0+)
384
+ athf hunt execute H-0013
341
385
 
342
386
  # List and search
343
387
  athf hunt list # All hunts
@@ -124,16 +124,21 @@ At Level 4, multiple specialized agents work together, coordinating through your
124
124
 
125
125
  ```
126
126
  [Triggered by CTI Monitor]
127
+ - Runs: athf agent run similarity-scorer --query "cmd.exe process execution" --limit 5
127
128
  - Reviews similar hunts: H-0042 (PowerShell), H-0089 (Process Execution)
129
+ - Runs: athf research new --topic "Qakbot cmd.exe execution" --technique T1059.003 --depth basic
128
130
  - Extracts lessons: "Include parent-child process chains", "Filter System32 parents"
131
+ - Runs: athf agent run hypothesis-generator --threat-intel "Qakbot T1059.003 campaign" --technique T1059.003
129
132
  - Generates LOCK hypothesis:
130
133
 
131
- Learn: Qakbot campaign using T1059.003 detected in CTI
134
+ Learn: Qakbot campaign using T1059.003 detected in CTI. Research document R-0042 created.
132
135
  Observe: Adversaries spawn cmd.exe from suspicious parents (Office, browsers)
133
136
  Check: [Generated Splunk query with bounds and limits]
134
137
  Keep: [Placeholder for execution results]
135
138
 
139
+ - Runs: athf hunt new --technique T1059.003 --title "Qakbot cmd.exe Detection" --research R-0042 --non-interactive
136
140
  - Creates: hunts/H-0156.md
141
+ - Runs: athf agent run query-validator --sql "[generated query]"
137
142
  - Validates query syntax
138
143
  - Decision: Draft ready, trigger Validator
139
144
  ```
@@ -142,12 +147,15 @@ At Level 4, multiple specialized agents work together, coordinating through your
142
147
 
143
148
  ```
144
149
  [Triggered by Hypothesis Generator]
150
+ - Runs: athf hunt validate H-0156
145
151
  - Reads AGENTS.md for data source availability
146
152
  - Checks: index=sysmon exists ✓
147
153
  - Checks: EventCode=1 available ✓
148
154
  - Validates: MITRE technique T1059.003 format ✓
155
+ - Runs: athf agent run query-validator --sql "[generated query from H-0156]"
149
156
  - Reviews: Query has time bounds ✓
150
157
  - Reviews: Query has result limits ✓
158
+ - Runs: athf agent run coverage-analyzer --tactic initial-access
151
159
  - Decision: Hunt validated, trigger Notifier
152
160
  ```
153
161
 
@@ -169,7 +169,7 @@ The AI automatically searches your hunts directory, references past investigatio
169
169
  4. Open your repo in Claude Code or similar AI assistant
170
170
  5. Start asking questions about your hunts
171
171
 
172
- **CLI Commands at Level 2:**
172
+ **CLI Commands at Level 2 (v0.3.0+):**
173
173
  At this level, you still run commands manually, but AI helps you decide what to run:
174
174
  ```bash
175
175
  # AI suggests: "Let me search for related hunts first"
@@ -180,6 +180,12 @@ athf hunt coverage
180
180
 
181
181
  # AI suggests: "Let's see your success rates"
182
182
  athf hunt stats
183
+
184
+ # AI suggests: "Let's do pre-hunt research first"
185
+ athf research new --topic "LSASS dumping" --technique T1003.001
186
+
187
+ # AI suggests: "Use the hypothesis generator agent"
188
+ athf agent run hypothesis-generator --threat-intel "APT29 credential theft"
183
189
  ```
184
190
 
185
191
  The AI reads your hunt files and provides context-aware suggestions, but you execute the commands.
@@ -250,23 +256,45 @@ Should I create a Jira ticket for investigation?"
250
256
 
251
257
  **The difference:** Claude executes queries, enriches data, and creates tickets - not just suggests them.
252
258
 
253
- ### CLI Integration at Level 3
259
+ ### CLI Integration at Level 3 (v0.3.0+)
254
260
 
255
261
  At Level 3, AI uses CLI commands directly as part of workflows:
256
262
 
257
- **Example: AI-Driven Hunt Creation**
263
+ **Example: AI-Driven Hunt Creation with Research**
258
264
  ```
259
- You: "Search for SSH brute force and create a hunt"
265
+ You: "Research and create a hunt for SSH brute force"
266
+
267
+ AI: [Uses: athf research new --topic "SSH brute force" --depth basic]
268
+ "Research complete. Key findings:
269
+ - SSH brute force typically targets default accounts
270
+ - Failed auth patterns indicate automated tools
271
+ - Successful login after failures is high-confidence indicator"
260
272
 
261
- AI: [Executes Splunk query via MCP]
273
+ [Uses: athf agent run hypothesis-generator --threat-intel "SSH brute force campaign"]
274
+ "Generated hypothesis focusing on failed auth clustering"
275
+
276
+ [Executes Splunk query via MCP]
262
277
  [Gets results: 3 high-volume IPs]
263
- [Uses: athf hunt new --technique T1110.001 --title "SSH Brute Force Detection"]
278
+ [Uses: athf hunt new --technique T1110.001 --research R-0023]
264
279
  [Documents findings in hunt file]
265
280
  [Uses: athf hunt validate to check structure]
266
- "Created H-0087.md documenting SSH brute force activity. Review?"
281
+ "Created H-0087.md with research link. Review?"
282
+ ```
283
+
284
+ **Example: Orchestrated Hunt Execution (v0.3.0+)**
285
+ ```
286
+ You: "Execute hunt H-0042 end-to-end"
287
+
288
+ AI: [Uses: athf hunt execute H-0042 --dry-run]
289
+ "Dry run validates all queries and data sources"
290
+ [Uses: athf hunt execute H-0042]
291
+ "Executing hunt with agent orchestration:
292
+ - Context loaded via context-loader agent
293
+ - Queries validated via query-validator agent
294
+ - Results analyzed, 2 suspicious findings flagged"
267
295
  ```
268
296
 
269
- **The difference:** You direct the workflow, AI executes both MCP tools (Splunk) and CLI commands (athf).
297
+ **The difference:** You direct the workflow, AI executes both MCP tools (Splunk) and CLI commands (athf), including research and agent orchestration.
270
298
 
271
299
  ### Getting Started at Level 3
272
300
 
@@ -329,7 +357,7 @@ At Level 4, multiple specialized agents work together:
329
357
  **You wake up to:**
330
358
  > "3 new draft hunts created overnight based on recent CTI. Ready for your review."
331
359
 
332
- ### CLI Commands in Autonomous Workflows
360
+ ### CLI Commands in Autonomous Workflows (v0.3.0+)
333
361
 
334
362
  At Level 4, agents use CLI commands without your intervention:
335
363
 
@@ -337,28 +365,42 @@ At Level 4, agents use CLI commands without your intervention:
337
365
  ```bash
338
366
  # CTI Monitor Agent (runs every 6 hours)
339
367
  athf hunt search "T1059.003" # Check for existing hunts
368
+ athf agent run similarity-scorer --query "Qakbot JavaScript" # Find related hunts
340
369
  # No matches found
341
370
 
371
+ # Research Agent (triggered if new TTP)
372
+ athf research new \
373
+ --topic "Qakbot JavaScript dropper" \
374
+ --technique T1059.003 \
375
+ --depth basic # Quick research for autonomous workflows
376
+
342
377
  # Hypothesis Generator Agent (triggered by CTI Monitor)
378
+ athf agent run hypothesis-generator \
379
+ --threat-intel "Qakbot campaign using T1059.003 for initial access" \
380
+ --technique T1059.003
381
+
382
+ # Create hunt file with generated hypothesis and research link
343
383
  athf hunt new \
344
384
  --technique T1059.003 \
345
385
  --title "Qakbot JavaScript Dropper Detection" \
386
+ --research R-0042 \
346
387
  --platform windows \
347
388
  --non-interactive
348
389
 
349
390
  # Validator Agent (triggered by Generator)
391
+ athf agent run query-validator --sql "[generated query]"
350
392
  athf hunt validate H-0156 # Ensure structure is correct
351
- athf hunt coverage # Update coverage metrics
393
+ athf agent run coverage-analyzer --tactic initial-access # Update coverage metrics
352
394
 
353
395
  # Notifier Agent (triggered by Validator)
354
- # Posts to Slack: "H-0156 ready for review"
396
+ # Posts to Slack: "H-0156 ready for review (research: R-0042)"
355
397
  ```
356
398
 
357
399
  **The progression:**
358
400
  - **Level 1:** You run `athf hunt new` manually
359
- - **Level 2:** AI suggests when to run `athf hunt new`
360
- - **Level 3:** AI runs `athf hunt new` when you ask
361
- - **Level 4:** Agents run `athf hunt new` autonomously based on objectives
401
+ - **Level 2:** AI suggests when to run `athf hunt new` and `athf agent run`
402
+ - **Level 3:** AI runs `athf hunt new`, `athf agent run`, and `athf research new` when you ask
403
+ - **Level 4:** Agents run all commands autonomously based on objectives
362
404
 
363
405
  ### The Maturity Progression
364
406