Detection Categories
Detection categories are similar to flow tags. They are used to group or ‘categorize’ detection models, after which rules - based on categories - can be crafted.
System
The system categories are based off the MITRE ATT&CK® framework.
configuration
Neto_configuration
iprep
IP Reputation Based
p2p
Peer To Peer
policy
Policy
rate
Rate Based
security
Security
t1001
T1001 Data Obfuscation
t1007
T1007 System Service Discovery
t1008
T1008 Fallback Channels
t1011
T1011 Exfiltration Over Other Network Medium
t1016
T1016 System Network Configuration Discovery
t1018
T1018 Remote System Discovery
t1020
T1020 Automated Exfiltration
t1021
T1021 Remote Services
t1033
T1033 System Owner or User Discovery
t1040
T1040 Network Sniffing
t1041
T1041 Exfiltration Over C2 Channel
t1043
T1043 Commonly Used Port
t1046
T1046 Network Service Scanning
t1048
T1048 Exfiltration Over Alternative Protocol
t1049
T1049 System Network Connections Discovery
t1082
T1082 System Information Discovery
t1083
T1083 File and Directory Discovery
t1090
T1090 Proxy
t1095
T1095 Non-Application Layer Protocol
t1102
T1102 Web Service
t1110
T1110 Brute Force
t1119
T1119 Automated Collection
t1124
T1124 System Time Discovery
t1133
T1133 External Remote Services
t1135
T1135 Network Share Discovery
t1136
T1136 Create Account
t1189
T1189 Drive-by Compromise
t1204
T1204 User Execution
t1205
T1205 Traffic Signaling
t1207
T1207 Rogue Domain Controller
t1219
T1219 Remote Access Software
t1482
T1482 Domain Trust Discovery
t1498
T1498 Network Denial of Service
t1499
T1499 Endpoint Denial of Service
t1518
T1518 Software Discovery
t1526
T1526 Cloud Service Discovery
t1534
T1534 Internal Spearphishing
t1535
T1535 Unused Unsupported Cloud Regions
t1537
T1537 Transfer Data to Cloud Account
t1538
T1538 Cloud Service Dashboard
t1557
T1557 Adversary-in-the-Middle
t1562
T1562 Impair Defenses
t1563
T1563 Remote Service Session Hijacking
t1566
T1566 Phishing
t1567
T1567 Exfiltration Over Web Service
t1568
T1568 Dynamic Resolution
t1571
T1571 Non-Standard Port
t1572
T1572 Protocol Tunneling
t1573
T1573 Encrypted Channel
t1578
T1578 Modify Cloud Compute Infrastructure
t1580
T1580 Cloud Infrastructure Discovery
t1583
T1583 Acquire Infrastructure
t1584
T1584 Compromise Infrastructure
t1585.001
T1585.001 Social Media Accounts
t1589
T1589 Gather Victim Identity Information
t1590
T1590 Gather Victim Network Information
t1592
T1592 Gather Victim Host Information
t1595
T1595 Active Scanning
t1598
T1598 Phishing for Information
t1599
T1599 Network Boundary Bridging
t1602
T1602 Data from Configuration Repository
t1614
T1614 System Location Discovery
t1619
T1619 Cloud Storage Object Discovery
ta0011
TA0011 Command and Control
Custom
In addition to the system default categories, custom detection categories can also be configured in Netography Fusion. To create a custom category in the portal, go to Settings > Detection Categories, then on the main Detection Categories menu, click ADD/UPDATE CATEGORY.
You can input your own category and description and click SAVE at the bottom of the window.
Last updated