Detection Service Results |
When threat analysis is performed by the Advanced Threat Prevention
cloud, this section contains entries showing the analysis results.
This includes the detection service report(s), which additionally
provides the MITRE ATT&CK® classified techniques employed, as
well as the payload details.
Command and control detections for the Empire C2 framework show
additional contextual information. This includes reports generated
from both the staging and command (post exploitation) phase of an
attack that occurs in separate sessions.
The following information entries are available:
Attack Description—describes the nature of the C2 attack.
Attack Details—indicates the phase of the Empire C2 attack
as well as describe the exchanges between the server and
client. Attack Evidences—lists behavior and actions consistent with
known Empire C2.
Empire-based C2 is detected using a
sub-module detector contained within the Inline Cloud
Analyzed HTTP Command and Control Traffic Detection
analysis engine with a unique threat ID of 89958.
|