# Detection Categories

Detection categories are similar to flow tags. They are used to group or ‘categorize’ detection models, after which rules - based on categories - can be crafted.

## System <a href="#system" id="system"></a>

The system categories are based off the [MITRE ATT\&CK®](https://attack.mitre.org/) framework.

| Short name    | Long name                                    |
| ------------- | -------------------------------------------- |
| configuration | Neto\_configuration                          |
| iprep         | IP Reputation Based                          |
| p2p           | Peer To Peer                                 |
| policy        | Policy                                       |
| rate          | Rate Based                                   |
| security      | Security                                     |
| t1001         | T1001 Data Obfuscation                       |
| t1007         | T1007 System Service Discovery               |
| t1008         | T1008 Fallback Channels                      |
| t1011         | T1011 Exfiltration Over Other Network Medium |
| t1016         | T1016 System Network Configuration Discovery |
| t1018         | T1018 Remote System Discovery                |
| t1020         | T1020 Automated Exfiltration                 |
| t1021         | T1021 Remote Services                        |
| t1033         | T1033 System Owner or User Discovery         |
| t1040         | T1040 Network Sniffing                       |
| t1041         | T1041 Exfiltration Over C2 Channel           |
| t1043         | T1043 Commonly Used Port                     |
| t1046         | T1046 Network Service Scanning               |
| t1048         | T1048 Exfiltration Over Alternative Protocol |
| t1049         | T1049 System Network Connections Discovery   |
| t1082         | T1082 System Information Discovery           |
| t1083         | T1083 File and Directory Discovery           |
| t1090         | T1090 Proxy                                  |
| t1095         | T1095 Non-Application Layer Protocol         |
| t1102         | T1102 Web Service                            |
| t1110         | T1110 Brute Force                            |
| t1119         | T1119 Automated Collection                   |
| t1124         | T1124 System Time Discovery                  |
| t1133         | T1133 External Remote Services               |
| t1135         | T1135 Network Share Discovery                |
| t1136         | T1136 Create Account                         |
| t1189         | T1189 Drive-by Compromise                    |
| t1204         | T1204 User Execution                         |
| t1205         | T1205 Traffic Signaling                      |
| t1207         | T1207 Rogue Domain Controller                |
| t1219         | T1219 Remote Access Software                 |
| t1482         | T1482 Domain Trust Discovery                 |
| t1498         | T1498 Network Denial of Service              |
| t1499         | T1499 Endpoint Denial of Service             |
| t1518         | T1518 Software Discovery                     |
| t1526         | T1526 Cloud Service Discovery                |
| t1534         | T1534 Internal Spearphishing                 |
| t1535         | T1535 Unused Unsupported Cloud Regions       |
| t1537         | T1537 Transfer Data to Cloud Account         |
| t1538         | T1538 Cloud Service Dashboard                |
| t1557         | T1557 Adversary-in-the-Middle                |
| t1562         | T1562 Impair Defenses                        |
| t1563         | T1563 Remote Service Session Hijacking       |
| t1566         | T1566 Phishing                               |
| t1567         | T1567 Exfiltration Over Web Service          |
| t1568         | T1568 Dynamic Resolution                     |
| t1571         | T1571 Non-Standard Port                      |
| t1572         | T1572 Protocol Tunneling                     |
| t1573         | T1573 Encrypted Channel                      |
| t1578         | T1578 Modify Cloud Compute Infrastructure    |
| t1580         | T1580 Cloud Infrastructure Discovery         |
| t1583         | T1583 Acquire Infrastructure                 |
| t1584         | T1584 Compromise Infrastructure              |
| t1585.001     | T1585.001 Social Media Accounts              |
| t1589         | T1589 Gather Victim Identity Information     |
| t1590         | T1590 Gather Victim Network Information      |
| t1592         | T1592 Gather Victim Host Information         |
| t1595         | T1595 Active Scanning                        |
| t1598         | T1598 Phishing for Information               |
| t1599         | T1599 Network Boundary Bridging              |
| t1602         | T1602 Data from Configuration Repository     |
| t1614         | T1614 System Location Discovery              |
| t1619         | T1619 Cloud Storage Object Discovery         |
| ta0011        | TA0011 Command and Control                   |

## Custom <a href="#custom" id="custom"></a>

In addition to the system default categories, custom detection categories can also be configured in Netography Fusion. To create a custom category in the portal, go to **Settings > Detection Categories**, then on the main Detection Categories menu, click **ADD/UPDATE CATEGORY**.

You can input your own category and description and click **SAVE** at the bottom of the window.
