Previous Topic: Worm Detected ActionNext Topic: Network Address Management Class Action


Trojan and Backdoor Programs Activity Action

Existing Action - It will be tagged with CEG classes Malware Activity or Information Leak depending on context.

Information

Level

Source - User Information

Tertiary

Source - Host Information

Primary

Source - Object Information

Primary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Secondary

Dest - Host Information

Primary

Dest - Object Information

Tertiary

Dest - Process Information

Tertiary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

Result

event_result

event_severity

Success

S

6