I. Introduction
Cyber threat hunting is the process of identifying threats and ongoing attacks by proactively searching for indicators of compromise undetected in the system [1]. It aims to uncover hidden traces to limit the harm and spread of a specific attack scenario. Once a new attack is discovered, security experts identify the attack’s main characteristics and release the attack scenario in Cyber Threat Intelligence (CTI) reports. Each attack scenario shows Indicators of Compromises (IOCs) and strategies related to the attack. The threat-hunting task becomes more critical when searching for sophisticated attacks such as Advanced Persistent Threats (APTs). In some cases, APT attacks use a ‘low and slow’ approach to stay undetected for months or even years.