| Detection of Bluetooth-Based Data Exfiltration - DET0554 (267a6c25-8d34-47ae-8357-9ae173adaa13) |
Detection Strategies |
Exfiltration Over Bluetooth - T1011.001 (613d08bc-e8f4-4791-80b0-c8b974340dfd) |
Attack Pattern |
1 |
| Detection of Bluetooth-Based Data Exfiltration - DET0554 (267a6c25-8d34-47ae-8357-9ae173adaa13) |
Detection Strategies |
Analytic 1531 - AN1531 (02fb4d83-d2db-4d49-acbc-85eff3b517d6) |
Analytics |
1 |
| Detection of Bluetooth-Based Data Exfiltration - DET0554 (267a6c25-8d34-47ae-8357-9ae173adaa13) |
Detection Strategies |
Analytic 1533 - AN1533 (2f6dd4a5-b0cc-4c13-abb8-e2d747d591b2) |
Analytics |
1 |
| Detection of Bluetooth-Based Data Exfiltration - DET0554 (267a6c25-8d34-47ae-8357-9ae173adaa13) |
Detection Strategies |
Analytic 1532 - AN1532 (01588556-4b25-4418-b746-9bca0279be2c) |
Analytics |
1 |
| Exfiltration Over Bluetooth - T1011.001 (613d08bc-e8f4-4791-80b0-c8b974340dfd) |
Attack Pattern |
Exfiltration Over Other Network Medium - T1011 (51ea26b1-ff1e-4faa-b1a0-1114cd298c87) |
Attack Pattern |
2 |