| Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - DET0512 (d187b646-5fb3-4d65-a190-e25e2131f802) |
Detection Strategies |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - T1048.002 (8e350c1d-ac79-4b5c-bd4e-7476d7e84ec5) |
Attack Pattern |
1 |
| Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - DET0512 (d187b646-5fb3-4d65-a190-e25e2131f802) |
Detection Strategies |
Analytic 1416 - AN1416 (20ecf7be-864a-4ae0-be66-cf26ffa9a217) |
Analytics |
1 |
| Analytic 1414 - AN1414 (a2309590-988e-4116-85e6-59bfc5357726) |
Analytics |
Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - DET0512 (d187b646-5fb3-4d65-a190-e25e2131f802) |
Detection Strategies |
1 |
| Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - DET0512 (d187b646-5fb3-4d65-a190-e25e2131f802) |
Detection Strategies |
Analytic 1413 - AN1413 (6869578d-d3e8-4a3c-9717-0a188dc0bafe) |
Analytics |
1 |
| Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - DET0512 (d187b646-5fb3-4d65-a190-e25e2131f802) |
Detection Strategies |
Analytic 1415 - AN1415 (46585379-5be9-4ce0-9178-c3492f539e11) |
Analytics |
1 |
| Exfiltration Over Asymmetric Encrypted Non-C2 Protocol - T1048.002 (8e350c1d-ac79-4b5c-bd4e-7476d7e84ec5) |
Attack Pattern |
Exfiltration Over Alternative Protocol - T1048 (a19e86f8-1c0a-4fea-8407-23b73d615776) |
Attack Pattern |
2 |