A Framework for Cyber Threat Hunting Part 3: The Value of Hunting TTPs