apmx_detect_patterns
Analyze APMX captured API calls to detect injection, evasion, and persistence patterns mapped to MITRE ATT&CK techniques. Returns risk level and suspicious call timeline.
Instructions
Detect injection/evasion/persistence patterns in APMX captured API calls. Analyzes runtime behavior (actually-called APIs) against known attack patterns with MITRE ATT&CK technique IDs. Returns risk level and suspicious call timeline.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| file_path | Yes | Path to .apmx64 or .apmx86 capture file | |
| process_index | No | Which process to analyze (0 = first/only process) |