"description":"Classification based on malware stealth techniques. Described in https://vxheaven.org/lib/pdf/Introducing%20Stealth%20Malware%20Taxonomy.pdf",
"expanded":"No OS or system compromise. The malware runs as a normal user process using only official API calls."
},
{
"value":"I",
"expanded":"The malware modifies constant sections of the kernel and/or processes such as code sections."
},
{
"value":"II",
"expanded":"The malware does not modify constant sections but only the dynamic sections of the kernel and/or processes such as data sections."
},
{
"value":"III",
"expanded":"The malware does not modify any sections of the kernel and/or processes but influences the system without modifying the OS. For example using hardware virtualization techniques."