Skip to content

Add Library/Module Loaded subcategory to macOS telemetry#171

Open
DefSecSentinel wants to merge 1 commit into
tsale:mainfrom
DefSecSentinel:add-macos-library-module-loaded
Open

Add Library/Module Loaded subcategory to macOS telemetry#171
DefSecSentinel wants to merge 1 commit into
tsale:mainfrom
DefSecSentinel:add-macos-library-module-loaded

Conversation

@DefSecSentinel
Copy link
Copy Markdown
Contributor

Summary

Adds a new "Library/Module Loaded" subcategory under Process Activity in the macOS telemetry matrix. This tracks dylib/shared library load events, a key data source for detecting dylib hijacking, dylib proxying, and DYLD_INSERT_LIBRARIES injection.

The Windows matrix already includes "Image/Library Loaded" under Process Activity. This adds the macOS equivalent.

Current vendor support

  • Elastic: Yes. Collected via ESF events since Elastic Defend 8.11.0, normalized as event.category: library and event.action: load on logs-endpoint.events.library*. Enabled by default when File event collection is active in the integration policy.

Evidence

Files changed

  • EDR_telem_macOS.json - new subcategory under Process Activity
  • partially_value_explanations_macOS.json - matching entry added
  • Tools/compare.py - scoring weight added (1.0, consistent with Windows/Linux)

New subcategory under Process Activity tracking dylib/shared library
load events. Elastic Defend collects these via ESF events since 8.11.0,
normalized as event.category: library and event.action: load.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@tsale tsale added the enhancement New feature or request label May 13, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants