THREAT TRACKING & INTRUSION ANALYSIS


<aside> <img src="/icons/alien-pixel_red.svg" alt="/icons/alien-pixel_red.svg" width="40px" />

ADVERSARY

[Threat actor causing an attack event]

ATTRIBUTION: [who]
MOTIVE: [why]
INTENT: [how/what]
PROFICIENCY: [skill level]
OUTCOME: [success/failure]

Attack timeline

</aside>

<aside> <img src="/icons/card-spade_purple.svg" alt="/icons/card-spade_purple.svg" width="40px" />

CAPABILITIES

[Known tactics, techniques and procedures of the adversary]

Capabilities

</aside>

<aside> <img src="/icons/flag-swallowtail_blue.svg" alt="/icons/flag-swallowtail_blue.svg" width="40px" />

VICTIM

[Target of an attack event]

ASSET: [what/who]
OWNER: [who owns the asset]
ORG: [organization]
SECTOR: [industry]
IMPACT: [consequences]
</aside>

<aside> <img src="/icons/kind_yellow.svg" alt="/icons/kind_yellow.svg" width="40px" />

INFRASTRUCTURE

[Known infrastructure assets utilized by the adversary]

Infrastructure

</aside>


E-mail the creator for questions & improvements feedback: [email protected]