Category | Description | Examples of Collected Data |
---|---|---|
Process and Thread Events | Detailed monitoring of process and thread creation, termination, and interaction, including their hierarchies. | * Process hierarchy * Associated parameters and calls * Malicious scripts |
Syscalls and System Calls | Collection of operating system calls to identify low-level interactions and potential API abuses. | * File accesses * Permission changes * Network calls |
Network and Communication Events | Recording connections and traffic patterns to identify malicious activities, such as connections to C&C servers. | * TCP/UDP connections * DNS resolutions * Detection of abnormal traffic patterns |
Security and Audit Logs | Collection of administrative logs and observation of changes in critical system configurations. | * Accesses/authentications * Modifications in critical configurations |
File and File System Monitoring | Recording operations on files and directories, including changes to system binaries and libraries. | * Accesses, deletions, and modifications * Changes in system libraries |