This fraudulent app install hierarchy displays the family group (tier 1), the fraud category (tier 2), and the method used (tier 3) to generate the app install.
For example, Attribution Fraud is the family group, Install Hijacking is the category and Malware is the method.
For this and more, we recommend our Welcome To Fraud: Install Fraud By Numbers (Infographic)
At Machine, we can help you detect app install fraud, and make sure your UA budget is converting into real users' budget.