This fraudulent app install hierarchy displays the family group (tier 1), the fraud category (tier 2), and the method used (tier 3) to generate the app install.
For example, Attribution Fraud is the family group, Install Hijacking is the category and Malware is the method.