# Stealth Malware Taxonomy
## Malware Types
All malware samples should be classified into one of the categories listed in the table below.
- Type 0
- No OS or system compromise. The malware runs as a normal user process using only official API calls.
-
- Type I
- The malware modifies constant sections of the kernel and/or processes such as code sections.
-
- Type II
- The malware does not modify constant sections but only the dynamic sections of the kernel and/or processes such as data sections.
-
- Type III
- The malware does not modify any sections of the kernel and/or processes but influences the system without modifying the OS. For example using hardware virtualization techniques.
-
# Machine-parsable Stealth Malware Taxonomy
The repository contains a [JSON file including the machine-parsable tags](machinetag.json)
along with their human-readable description. The software can use both
representation on the user-interface and store the tag as machine-parsable.
~~~~
stealth_malware:type="II"
~~~~
Based on:
https://vxheaven.org/lib/pdf/Introducing%20Stealth%20Malware%20Taxonomy.pdf