Skip to content

Commit 8b879f0

Browse files
committed
Learn Editor: Update malware-naming.md
1 parent f015fb6 commit 8b879f0

File tree

1 file changed

+53
-34
lines changed

1 file changed

+53
-34
lines changed

unified-secops-platform/malware-naming.md

Lines changed: 53 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -25,30 +25,24 @@ When our analysts research a particular threat, they determine what each of the
2525

2626
## Type
2727

28-
Describes what the malware does on your computer. Worms, viruses, trojans, backdoors, and ransomware are some of the most common types of malware.
28+
Type describes what the malware does on your computer. The following information are the different types of malware that Microsoft products detect.
29+
30+
### Malware
31+
32+
Following are the types of malware that Microsoft detects. To know more about how Microsoft defines malware, see [How Microsoft identifies malware and potentially unwanted applications - Malware](criteria.m#malware).
33+
2934
```
30-
* Adware
3135
* Backdoor
32-
* Behavior
33-
* BrowserModifier
3436
* Constructor
3537
* DDoS
3638
* Exploit
3739
* HackTool
3840
* Joke
39-
* Misleading
40-
* MonitoringTool
41-
* Program
4241
* Password Stealer (PWS)
4342
* Ransom
44-
* RemoteAccess
4543
* Rogue
46-
* SettingsModifier
47-
* SoftwareBundler
4844
* Spammer
4945
* Spoofer
50-
* Spyware
51-
* Tool
5246
* Trojan
5347
* TrojanClicker
5448
* TrojanDownloader
@@ -59,6 +53,52 @@ Describes what the malware does on your computer. Worms, viruses, trojans, backd
5953
* Virus
6054
* Worm
6155
```
56+
57+
### Unwanted software
58+
59+
Following are the types of unwanted software that Microsoft products detect. See [Unwanted software](criteria.md#unwanted-software) for more information on what unwanted software is and what is classified as unwanted software.
60+
61+
```
62+
* Adware
63+
* BrowserModifier
64+
* Misleading
65+
* MonitoringTool
66+
* Program
67+
* SoftwareBundler
68+
* UwS
69+
```
70+
71+
### Potentially unwanted applications
72+
73+
Following are the types of potentially unwanted applications (PUAs) that Microsoft products detect. To know what PUAs are, see [Potentially unwanted application (PUA)](criteria.md#potentially-unwanted-application-pua).
74+
75+
```
76+
* PUA
77+
* App
78+
* PUAAdvertising
79+
* PUATorrent
80+
* PUAMiner
81+
* PUAMarketing
82+
* PUABundler
83+
* PUADlManager
84+
```
85+
### Tampering software
86+
87+
Tampering software, detected as ***Tampering** are tools that can lower device security. To know more, see [Tampering software](criteria.md#tampering-software).
88+
89+
### Vulnerable software
90+
91+
Following are the types of vulnerable software that Microsoft products detect. Know more about this detection in [Vulnerable software](criteria.md#vulnerable-software).
92+
93+
```
94+
* Vulnerable
95+
* VulnerableDriver
96+
```
97+
98+
### Other malware types
99+
100+
Microsoft also detects ***Behavior** and ***Tool** types of malware.
101+
62102
## Platforms
63103

64104
Platforms guide the malware to its compatible operating system (such as Windows, macOS, and Android). The platform's guidance is also used for programming languages and file formats.
@@ -161,25 +201,4 @@ Used sequentially for every distinct version of a malware family. For example, t
161201

162202
## Suffixes
163203

164-
Provides extra detail about the malware, including how it's used as part of a multicomponent threat. In the preceding example, **"!lnk"** indicates that the threat component is a shortcut file used by Trojan: **Win32/Reveton.T**.
165-
```
166-
* .dam: damaged malware
167-
* .dll: Dynamic Link Library component of a malware
168-
* .dr: dropper component of a malware
169-
* .gen: malware that is detected using a generic signature
170-
* .kit: virus constructor
171-
* .ldr: loader component of a malware
172-
* .pak: compressed malware
173-
* .plugin: plug-in component
174-
* .remnants: remnants of a virus
175-
* .worm: worm component of that malware
176-
* !bit: an internal category used to refer to some threats
177-
* !cl: an internal category used to refer to some threats
178-
* !dha: an internal category used to refer to some threats
179-
* !pfn: an internal category used to refer to some threats
180-
* !plock: an internal category used to refer to some threats
181-
* !rfn: an internal category used to refer to some threats
182-
* !rootkit: rootkit component of that malware
183-
* @m: worm mailers
184-
* @mm: mass mailer worm
185-
```
204+
A suffix that begins with **!** is an indicator used by Microsoft internally.

0 commit comments

Comments
 (0)