Detection Categories

Detection categories are similar to flow tags. They are used to group or ‘categorize’ detection models, after which rules - based on categories - can be crafted.

System

The system categories are based off the MITRE ATT&CK® framework.

Short name
Long name

configuration

Neto_configuration

iprep

IP Reputation Based

p2p

Peer To Peer

policy

Policy

rate

Rate Based

security

Security

t1001

T1001 Data Obfuscation

t1007

T1007 System Service Discovery

t1008

T1008 Fallback Channels

t1011

T1011 Exfiltration Over Other Network Medium

t1016

T1016 System Network Configuration Discovery

t1018

T1018 Remote System Discovery

t1020

T1020 Automated Exfiltration

t1021

T1021 Remote Services

t1033

T1033 System Owner or User Discovery

t1040

T1040 Network Sniffing

t1041

T1041 Exfiltration Over C2 Channel

t1043

T1043 Commonly Used Port

t1046

T1046 Network Service Scanning

t1048

T1048 Exfiltration Over Alternative Protocol

t1049

T1049 System Network Connections Discovery

t1082

T1082 System Information Discovery

t1083

T1083 File and Directory Discovery

t1090

T1090 Proxy

t1095

T1095 Non-Application Layer Protocol

t1102

T1102 Web Service

t1110

T1110 Brute Force

t1119

T1119 Automated Collection

t1124

T1124 System Time Discovery

t1133

T1133 External Remote Services

t1135

T1135 Network Share Discovery

t1136

T1136 Create Account

t1189

T1189 Drive-by Compromise

t1204

T1204 User Execution

t1205

T1205 Traffic Signaling

t1207

T1207 Rogue Domain Controller

t1219

T1219 Remote Access Software

t1482

T1482 Domain Trust Discovery

t1498

T1498 Network Denial of Service

t1499

T1499 Endpoint Denial of Service

t1518

T1518 Software Discovery

t1526

T1526 Cloud Service Discovery

t1534

T1534 Internal Spearphishing

t1535

T1535 Unused Unsupported Cloud Regions

t1537

T1537 Transfer Data to Cloud Account

t1538

T1538 Cloud Service Dashboard

t1557

T1557 Adversary-in-the-Middle

t1562

T1562 Impair Defenses

t1563

T1563 Remote Service Session Hijacking

t1566

T1566 Phishing

t1567

T1567 Exfiltration Over Web Service

t1568

T1568 Dynamic Resolution

t1571

T1571 Non-Standard Port

t1572

T1572 Protocol Tunneling

t1573

T1573 Encrypted Channel

t1578

T1578 Modify Cloud Compute Infrastructure

t1580

T1580 Cloud Infrastructure Discovery

t1583

T1583 Acquire Infrastructure

t1584

T1584 Compromise Infrastructure

t1585.001

T1585.001 Social Media Accounts

t1589

T1589 Gather Victim Identity Information

t1590

T1590 Gather Victim Network Information

t1592

T1592 Gather Victim Host Information

t1595

T1595 Active Scanning

t1598

T1598 Phishing for Information

t1599

T1599 Network Boundary Bridging

t1602

T1602 Data from Configuration Repository

t1614

T1614 System Location Discovery

t1619

T1619 Cloud Storage Object Discovery

ta0011

TA0011 Command and Control

Custom

In addition to the system default categories, custom detection categories can also be configured in Netography Fusion. To create a custom category in the portal, go to Settings > Detection Categories, then on the main Detection Categories menu, click ADD/UPDATE CATEGORY.

You can input your own category and description and click SAVE at the bottom of the window.

Last updated