Field Name
|
Information
|
|||
---|---|---|---|---|
File/Email Message Sample
|
URL Sample
|
|||
Submission details
|
Basic data fields (such as Logged, File name, and Type) extracted from the raw logs
|
Basic data fields (such as Logged, URL, Source IP and port, and Destination IP and
port) extracted from the raw logs
|
||
|
||||
Notable characteristics
|
|
|||
Other submission logs
|
A table that shows the following information about other log submissions:
|
|||
MITRE ATT&CK ™ Framework
|
A list of MITRE ATT&CK ™ tactics and
techniques detected. Click a link to view more information on the MITRE
website.
|
|||
Report
|
The PDF icon () links to a
downloadable PDF report and the HTML icon ()
links to an interactive HTML report.
|
|||
Investigation package
|
Download links to a password-protected investigation
package that you can download to perform additional investigations.
For details, see Investigation Package.
|
|||
Global intelligence
|
View in Threat Connect is a link that opens Trend Micro Threat Connect
The page contains detailed information about the sample.
|