THREAT TRACKING & INTRUSION ANALYSIS
<aside> <img src="/icons/alien-pixel_red.svg" alt="/icons/alien-pixel_red.svg" width="40px" />
[Threat actor causing an attack event]
| ATTRIBUTION: | [who] |
|---|---|
| MOTIVE: | [why] |
| INTENT: | [how/what] |
| PROFICIENCY: | [skill level] |
| OUTCOME: | [success/failure] |
</aside>
<aside> <img src="/icons/card-spade_purple.svg" alt="/icons/card-spade_purple.svg" width="40px" />
[Known tactics, techniques and procedures of the adversary]
</aside>
<aside> <img src="/icons/flag-swallowtail_blue.svg" alt="/icons/flag-swallowtail_blue.svg" width="40px" />
[Target of an attack event]
| ASSET: | [what/who] |
|---|---|
| OWNER: | [who owns the asset] |
| ORG: | [organization] |
| SECTOR: | [industry] |
| IMPACT: | [consequences] |
| </aside> |
<aside> <img src="/icons/kind_yellow.svg" alt="/icons/kind_yellow.svg" width="40px" />
[Known infrastructure assets utilized by the adversary]
</aside>
E-mail the creator for questions & improvements feedback: [email protected]