A development team is analyzing a new feature for an online banking application.
To identify potential security flaws, they are categorizing threats into the following groups: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.
Which threat modeling methodology is the team using?