You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/malware-naming.md
+53-34Lines changed: 53 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,30 +25,24 @@ When our analysts research a particular threat, they determine what each of the
25
25
26
26
## Type
27
27
28
-
Describes what the malware does on your computer. Worms, viruses, trojans, backdoors, and ransomware are some of the most common types of malware.
28
+
Type describes what the malware does on your computer. The following information are the different types of malware that Microsoft products detect.
29
+
30
+
### Malware
31
+
32
+
Following are the types of malware that Microsoft detects. To know more about how Microsoft defines malware, see [How Microsoft identifies malware and potentially unwanted applications - Malware](criteria.m#malware).
33
+
29
34
```
30
-
* Adware
31
35
* Backdoor
32
-
* Behavior
33
-
* BrowserModifier
34
36
* Constructor
35
37
* DDoS
36
38
* Exploit
37
39
* HackTool
38
40
* Joke
39
-
* Misleading
40
-
* MonitoringTool
41
-
* Program
42
41
* Password Stealer (PWS)
43
42
* Ransom
44
-
* RemoteAccess
45
43
* Rogue
46
-
* SettingsModifier
47
-
* SoftwareBundler
48
44
* Spammer
49
45
* Spoofer
50
-
* Spyware
51
-
* Tool
52
46
* Trojan
53
47
* TrojanClicker
54
48
* TrojanDownloader
@@ -59,6 +53,52 @@ Describes what the malware does on your computer. Worms, viruses, trojans, backd
59
53
* Virus
60
54
* Worm
61
55
```
56
+
57
+
### Unwanted software
58
+
59
+
Following are the types of unwanted software that Microsoft products detect. See [Unwanted software](criteria.md#unwanted-software) for more information on what unwanted software is and what is classified as unwanted software.
60
+
61
+
```
62
+
* Adware
63
+
* BrowserModifier
64
+
* Misleading
65
+
* MonitoringTool
66
+
* Program
67
+
* SoftwareBundler
68
+
* UwS
69
+
```
70
+
71
+
### Potentially unwanted applications
72
+
73
+
Following are the types of potentially unwanted applications (PUAs) that Microsoft products detect. To know what PUAs are, see [Potentially unwanted application (PUA)](criteria.md#potentially-unwanted-application-pua).
74
+
75
+
```
76
+
* PUA
77
+
* App
78
+
* PUAAdvertising
79
+
* PUATorrent
80
+
* PUAMiner
81
+
* PUAMarketing
82
+
* PUABundler
83
+
* PUADlManager
84
+
```
85
+
### Tampering software
86
+
87
+
Tampering software, detected as ***Tampering** are tools that can lower device security. To know more, see [Tampering software](criteria.md#tampering-software).
88
+
89
+
### Vulnerable software
90
+
91
+
Following are the types of vulnerable software that Microsoft products detect. Know more about this detection in [Vulnerable software](criteria.md#vulnerable-software).
92
+
93
+
```
94
+
* Vulnerable
95
+
* VulnerableDriver
96
+
```
97
+
98
+
### Other malware types
99
+
100
+
Microsoft also detects ***Behavior** and ***Tool** types of malware.
101
+
62
102
## Platforms
63
103
64
104
Platforms guide the malware to its compatible operating system (such as Windows, macOS, and Android). The platform's guidance is also used for programming languages and file formats.
@@ -161,25 +201,4 @@ Used sequentially for every distinct version of a malware family. For example, t
161
201
162
202
## Suffixes
163
203
164
-
Provides extra detail about the malware, including how it's used as part of a multicomponent threat. In the preceding example, **"!lnk"** indicates that the threat component is a shortcut file used by Trojan: **Win32/Reveton.T**.
165
-
```
166
-
* .dam: damaged malware
167
-
* .dll: Dynamic Link Library component of a malware
168
-
* .dr: dropper component of a malware
169
-
* .gen: malware that is detected using a generic signature
170
-
* .kit: virus constructor
171
-
* .ldr: loader component of a malware
172
-
* .pak: compressed malware
173
-
* .plugin: plug-in component
174
-
* .remnants: remnants of a virus
175
-
* .worm: worm component of that malware
176
-
* !bit: an internal category used to refer to some threats
177
-
* !cl: an internal category used to refer to some threats
178
-
* !dha: an internal category used to refer to some threats
179
-
* !pfn: an internal category used to refer to some threats
180
-
* !plock: an internal category used to refer to some threats
181
-
* !rfn: an internal category used to refer to some threats
182
-
* !rootkit: rootkit component of that malware
183
-
* @m: worm mailers
184
-
* @mm: mass mailer worm
185
-
```
204
+
A suffix that begins with **!** is an indicator used by Microsoft internally.
0 commit comments