A Framework for Cyber Threat Hunting Part 1: The Pyramid of Pain