Skip to content

/AWS1/CL_GDYRUNTIMECONTEXT

Additional information about the suspicious activity.

CONSTRUCTOR

IMPORTING

Optional arguments:

io_modifyingprocess TYPE REF TO /AWS1/CL_GDYPROCESSDETAILS /AWS1/CL_GDYPROCESSDETAILS

Information about the process that modified the current process. This is available for multiple finding types.

iv_modifiedat TYPE /AWS1/GDYTIMESTAMP /AWS1/GDYTIMESTAMP

The timestamp at which the process modified the current process. The timestamp is in UTC date string format.

iv_scriptpath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path to the script that was executed.

iv_librarypath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path to the new library that was loaded.

iv_ldpreloadvalue TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The value of the LD_PRELOAD environment variable.

iv_socketpath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path to the docket socket that was accessed.

iv_runcbinarypath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path to the leveraged runc implementation.

iv_releaseagentpath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path in the container that modified the release agent file.

iv_mountsource TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path on the host that is mounted by the container.

iv_mounttarget TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path in the container that is mapped to the host directory.

iv_filesystemtype TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

Represents the type of mounted fileSystem.

it_flags TYPE /AWS1/CL_GDYFLAGSLIST_W=>TT_FLAGSLIST TT_FLAGSLIST

Represents options that control the behavior of a runtime operation or action. For example, a filesystem mount operation may contain a read-only flag.

iv_modulename TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The name of the module loaded into the kernel.

iv_modulefilepath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path to the module loaded into the kernel.

iv_modulesha256 TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The SHA256 hash of the module.

iv_shellhistoryfilepath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The path to the modified shell history file.

io_targetprocess TYPE REF TO /AWS1/CL_GDYPROCESSDETAILS /AWS1/CL_GDYPROCESSDETAILS

Information about the process that had its memory overwritten by the current process.

iv_addressfamily TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

Represents the communication protocol associated with the address. For example, the address family AF_INET is used for IP version of 4 protocol.

iv_ianaprotocolnumber TYPE /AWS1/GDYINTEGER /AWS1/GDYINTEGER

Specifies a particular protocol within the address family. Usually there is a single protocol in address families. For example, the address family AF_INET only has the IP protocol.

it_memoryregions TYPE /AWS1/CL_GDYMEMORYREGIONSLST_W=>TT_MEMORYREGIONSLIST TT_MEMORYREGIONSLIST

Specifies the Region of a process's address space such as stack and heap.

iv_toolname TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

Name of the potentially suspicious tool.

iv_toolcategory TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

Category that the tool belongs to. Some of the examples are Backdoor Tool, Pentest Tool, Network Scanner, and Network Sniffer.

iv_servicename TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

Name of the security service that has been potentially disabled.

iv_commandlineexample TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

Example of the command line involved in the suspicious activity.

iv_threatfilepath TYPE /AWS1/GDYSTRING /AWS1/GDYSTRING

The suspicious file path for which the threat intelligence details were found.


Queryable Attributes

ModifyingProcess

Information about the process that modified the current process. This is available for multiple finding types.

Accessible with the following methods

Method Description
GET_MODIFYINGPROCESS() Getter for MODIFYINGPROCESS

ModifiedAt

The timestamp at which the process modified the current process. The timestamp is in UTC date string format.

Accessible with the following methods

Method Description
GET_MODIFIEDAT() Getter for MODIFIEDAT, with configurable default
ASK_MODIFIEDAT() Getter for MODIFIEDAT w/ exceptions if field has no value
HAS_MODIFIEDAT() Determine if MODIFIEDAT has a value

ScriptPath

The path to the script that was executed.

Accessible with the following methods

Method Description
GET_SCRIPTPATH() Getter for SCRIPTPATH, with configurable default
ASK_SCRIPTPATH() Getter for SCRIPTPATH w/ exceptions if field has no value
HAS_SCRIPTPATH() Determine if SCRIPTPATH has a value

LibraryPath

The path to the new library that was loaded.

Accessible with the following methods

Method Description
GET_LIBRARYPATH() Getter for LIBRARYPATH, with configurable default
ASK_LIBRARYPATH() Getter for LIBRARYPATH w/ exceptions if field has no value
HAS_LIBRARYPATH() Determine if LIBRARYPATH has a value

LdPreloadValue

The value of the LD_PRELOAD environment variable.

Accessible with the following methods

Method Description
GET_LDPRELOADVALUE() Getter for LDPRELOADVALUE, with configurable default
ASK_LDPRELOADVALUE() Getter for LDPRELOADVALUE w/ exceptions if field has no valu
HAS_LDPRELOADVALUE() Determine if LDPRELOADVALUE has a value

SocketPath

The path to the docket socket that was accessed.

Accessible with the following methods

Method Description
GET_SOCKETPATH() Getter for SOCKETPATH, with configurable default
ASK_SOCKETPATH() Getter for SOCKETPATH w/ exceptions if field has no value
HAS_SOCKETPATH() Determine if SOCKETPATH has a value

RuncBinaryPath

The path to the leveraged runc implementation.

Accessible with the following methods

Method Description
GET_RUNCBINARYPATH() Getter for RUNCBINARYPATH, with configurable default
ASK_RUNCBINARYPATH() Getter for RUNCBINARYPATH w/ exceptions if field has no valu
HAS_RUNCBINARYPATH() Determine if RUNCBINARYPATH has a value

ReleaseAgentPath

The path in the container that modified the release agent file.

Accessible with the following methods

Method Description
GET_RELEASEAGENTPATH() Getter for RELEASEAGENTPATH, with configurable default
ASK_RELEASEAGENTPATH() Getter for RELEASEAGENTPATH w/ exceptions if field has no va
HAS_RELEASEAGENTPATH() Determine if RELEASEAGENTPATH has a value

MountSource

The path on the host that is mounted by the container.

Accessible with the following methods

Method Description
GET_MOUNTSOURCE() Getter for MOUNTSOURCE, with configurable default
ASK_MOUNTSOURCE() Getter for MOUNTSOURCE w/ exceptions if field has no value
HAS_MOUNTSOURCE() Determine if MOUNTSOURCE has a value

MountTarget

The path in the container that is mapped to the host directory.

Accessible with the following methods

Method Description
GET_MOUNTTARGET() Getter for MOUNTTARGET, with configurable default
ASK_MOUNTTARGET() Getter for MOUNTTARGET w/ exceptions if field has no value
HAS_MOUNTTARGET() Determine if MOUNTTARGET has a value

FileSystemType

Represents the type of mounted fileSystem.

Accessible with the following methods

Method Description
GET_FILESYSTEMTYPE() Getter for FILESYSTEMTYPE, with configurable default
ASK_FILESYSTEMTYPE() Getter for FILESYSTEMTYPE w/ exceptions if field has no valu
HAS_FILESYSTEMTYPE() Determine if FILESYSTEMTYPE has a value

Flags

Represents options that control the behavior of a runtime operation or action. For example, a filesystem mount operation may contain a read-only flag.

Accessible with the following methods

Method Description
GET_FLAGS() Getter for FLAGS, with configurable default
ASK_FLAGS() Getter for FLAGS w/ exceptions if field has no value
HAS_FLAGS() Determine if FLAGS has a value

ModuleName

The name of the module loaded into the kernel.

Accessible with the following methods

Method Description
GET_MODULENAME() Getter for MODULENAME, with configurable default
ASK_MODULENAME() Getter for MODULENAME w/ exceptions if field has no value
HAS_MODULENAME() Determine if MODULENAME has a value

ModuleFilePath

The path to the module loaded into the kernel.

Accessible with the following methods

Method Description
GET_MODULEFILEPATH() Getter for MODULEFILEPATH, with configurable default
ASK_MODULEFILEPATH() Getter for MODULEFILEPATH w/ exceptions if field has no valu
HAS_MODULEFILEPATH() Determine if MODULEFILEPATH has a value

ModuleSha256

The SHA256 hash of the module.

Accessible with the following methods

Method Description
GET_MODULESHA256() Getter for MODULESHA256, with configurable default
ASK_MODULESHA256() Getter for MODULESHA256 w/ exceptions if field has no value
HAS_MODULESHA256() Determine if MODULESHA256 has a value

ShellHistoryFilePath

The path to the modified shell history file.

Accessible with the following methods

Method Description
GET_SHELLHISTORYFILEPATH() Getter for SHELLHISTORYFILEPATH, with configurable default
ASK_SHELLHISTORYFILEPATH() Getter for SHELLHISTORYFILEPATH w/ exceptions if field has n
HAS_SHELLHISTORYFILEPATH() Determine if SHELLHISTORYFILEPATH has a value

TargetProcess

Information about the process that had its memory overwritten by the current process.

Accessible with the following methods

Method Description
GET_TARGETPROCESS() Getter for TARGETPROCESS

AddressFamily

Represents the communication protocol associated with the address. For example, the address family AF_INET is used for IP version of 4 protocol.

Accessible with the following methods

Method Description
GET_ADDRESSFAMILY() Getter for ADDRESSFAMILY, with configurable default
ASK_ADDRESSFAMILY() Getter for ADDRESSFAMILY w/ exceptions if field has no value
HAS_ADDRESSFAMILY() Determine if ADDRESSFAMILY has a value

IanaProtocolNumber

Specifies a particular protocol within the address family. Usually there is a single protocol in address families. For example, the address family AF_INET only has the IP protocol.

Accessible with the following methods

Method Description
GET_IANAPROTOCOLNUMBER() Getter for IANAPROTOCOLNUMBER, with configurable default
ASK_IANAPROTOCOLNUMBER() Getter for IANAPROTOCOLNUMBER w/ exceptions if field has no
HAS_IANAPROTOCOLNUMBER() Determine if IANAPROTOCOLNUMBER has a value

MemoryRegions

Specifies the Region of a process's address space such as stack and heap.

Accessible with the following methods

Method Description
GET_MEMORYREGIONS() Getter for MEMORYREGIONS, with configurable default
ASK_MEMORYREGIONS() Getter for MEMORYREGIONS w/ exceptions if field has no value
HAS_MEMORYREGIONS() Determine if MEMORYREGIONS has a value

ToolName

Name of the potentially suspicious tool.

Accessible with the following methods

Method Description
GET_TOOLNAME() Getter for TOOLNAME, with configurable default
ASK_TOOLNAME() Getter for TOOLNAME w/ exceptions if field has no value
HAS_TOOLNAME() Determine if TOOLNAME has a value

ToolCategory

Category that the tool belongs to. Some of the examples are Backdoor Tool, Pentest Tool, Network Scanner, and Network Sniffer.

Accessible with the following methods

Method Description
GET_TOOLCATEGORY() Getter for TOOLCATEGORY, with configurable default
ASK_TOOLCATEGORY() Getter for TOOLCATEGORY w/ exceptions if field has no value
HAS_TOOLCATEGORY() Determine if TOOLCATEGORY has a value

ServiceName

Name of the security service that has been potentially disabled.

Accessible with the following methods

Method Description
GET_SERVICENAME() Getter for SERVICENAME, with configurable default
ASK_SERVICENAME() Getter for SERVICENAME w/ exceptions if field has no value
HAS_SERVICENAME() Determine if SERVICENAME has a value

CommandLineExample

Example of the command line involved in the suspicious activity.

Accessible with the following methods

Method Description
GET_COMMANDLINEEXAMPLE() Getter for COMMANDLINEEXAMPLE, with configurable default
ASK_COMMANDLINEEXAMPLE() Getter for COMMANDLINEEXAMPLE w/ exceptions if field has no
HAS_COMMANDLINEEXAMPLE() Determine if COMMANDLINEEXAMPLE has a value

ThreatFilePath

The suspicious file path for which the threat intelligence details were found.

Accessible with the following methods

Method Description
GET_THREATFILEPATH() Getter for THREATFILEPATH, with configurable default
ASK_THREATFILEPATH() Getter for THREATFILEPATH w/ exceptions if field has no valu
HAS_THREATFILEPATH() Determine if THREATFILEPATH has a value