THREAT TRACKING & INTRUSION ANALYSIS
<aside> <img src="/icons/alien-pixel_red.svg" alt="/icons/alien-pixel_red.svg" width="40px" />
[Threat actor causing an attack event]
ATTRIBUTION: | [who] |
---|---|
MOTIVE: | [why] |
INTENT: | [how/what] |
PROFICIENCY: | [skill level] |
OUTCOME: | [success/failure] |
</aside>
<aside> <img src="/icons/card-spade_purple.svg" alt="/icons/card-spade_purple.svg" width="40px" />
[Known tactics, techniques and procedures of the adversary]
</aside>
<aside> <img src="/icons/flag-swallowtail_blue.svg" alt="/icons/flag-swallowtail_blue.svg" width="40px" />
[Target of an attack event]
ASSET: | [what/who] |
---|---|
OWNER: | [who owns the asset] |
ORG: | [organization] |
SECTOR: | [industry] |
IMPACT: | [consequences] |
</aside> |
<aside> <img src="/icons/kind_yellow.svg" alt="/icons/kind_yellow.svg" width="40px" />
[Known infrastructure assets utilized by the adversary]
</aside>
E-mail the creator for questions & improvements feedback: [email protected]