| Runtime Data Manipulation - T1565.003 (32ad5c86-2bcf-47d8-8fdc-d7f3d79a7490) |
Attack Pattern |
Detection Strategy for Runtime Data Manipulation. - DET0391 (41107d12-dd2e-439f-af29-1a10dcfcb6ce) |
Detection Strategies |
1 |
| Detection Strategy for Runtime Data Manipulation. - DET0391 (41107d12-dd2e-439f-af29-1a10dcfcb6ce) |
Detection Strategies |
Analytic 1099 - AN1099 (a9c30b9d-6810-47d3-8bf5-ca787836e7ef) |
Analytics |
1 |
| Detection Strategy for Runtime Data Manipulation. - DET0391 (41107d12-dd2e-439f-af29-1a10dcfcb6ce) |
Detection Strategies |
Analytic 1097 - AN1097 (c07e8730-b5cf-4a74-be3a-938184af42df) |
Analytics |
1 |
| Analytic 1098 - AN1098 (e2e39b7e-02e4-4e7a-966c-6b05721da8f7) |
Analytics |
Detection Strategy for Runtime Data Manipulation. - DET0391 (41107d12-dd2e-439f-af29-1a10dcfcb6ce) |
Detection Strategies |
1 |
| Runtime Data Manipulation - T1565.003 (32ad5c86-2bcf-47d8-8fdc-d7f3d79a7490) |
Attack Pattern |
Data Manipulation - T1565 (ac9e6b22-11bf-45d7-9181-c1cb08360931) |
Attack Pattern |
2 |