This whitepaper details methodologies in relation to threat hunting.
You can download it from the following link: https://packetstormsecurity.com/files/download/153399/threat-hunting.pdf
Source: https://packetstormsecurity.com/files/153399/Threat-Hunting-Hunter-Or-Hunted.html