Skip to content

Commit 2694bdf

Browse files
roikolrafaeldtinoco
authored andcommitted
signatures: serialize TRC IDs
1 parent 5add098 commit 2694bdf

File tree

62 files changed

+251
-637
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+251
-637
lines changed

signatures/golang/anti_debugging_ptraceme.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ func (sig *AntiDebuggingPtraceme) Init(cb detect.SignatureHandler) error {
2222

2323
func (sig *AntiDebuggingPtraceme) GetMetadata() (detect.SignatureMetadata, error) {
2424
return detect.SignatureMetadata{
25-
ID: "TRC-2",
25+
ID: "TRC-102",
2626
Version: "1",
2727
Name: "Anti-Debugging detected",
2828
Description: "A process used anti-debugging techniques to block a debugger. Malware use anti-debugging to stay invisible and inhibit analysis of their behavior.",

signatures/golang/anti_debugging_ptraceme_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ func TestAntiDebuggingPtraceme(t *testing.T) {
3232
},
3333
},
3434
Findings: map[string]detect.Finding{
35-
"TRC-2": {
35+
"TRC-102": {
3636
Data: nil,
3737
Event: trace.Event{
3838
EventName: "ptrace",
@@ -46,7 +46,7 @@ func TestAntiDebuggingPtraceme(t *testing.T) {
4646
},
4747
}.ToProtocol(),
4848
SigMetadata: detect.SignatureMetadata{
49-
ID: "TRC-2",
49+
ID: "TRC-102",
5050
Version: "1",
5151
Name: "Anti-Debugging detected",
5252
Description: "A process used anti-debugging techniques to block a debugger. Malware use anti-debugging to stay invisible and inhibit analysis of their behavior.",

signatures/golang/aslr_inspection.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ func (sig *AslrInspection) Init(cb detect.SignatureHandler) error {
2222

2323
func (sig *AslrInspection) GetMetadata() (detect.SignatureMetadata, error) {
2424
return detect.SignatureMetadata{
25-
ID: "TRC-9",
25+
ID: "TRC-109",
2626
Version: "1",
2727
Name: "ASLR inspection detected",
2828
Description: "The ASLR (address space layout randomization) configuration was inspected. ASLR is used by Linux to prevent memory vulnerabilities. An adversary may want to inspect and change the ASLR configuration in order to avoid detection.",

signatures/golang/aslr_inspection_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestAslrInspection(t *testing.T) {
3838
},
3939
},
4040
Findings: map[string]detect.Finding{
41-
"TRC-9": {
41+
"TRC-109": {
4242
Data: nil,
4343
Event: trace.Event{
4444
EventName: "security_file_open",
@@ -58,7 +58,7 @@ func TestAslrInspection(t *testing.T) {
5858
},
5959
}.ToProtocol(),
6060
SigMetadata: detect.SignatureMetadata{
61-
ID: "TRC-9",
61+
ID: "TRC-109",
6262
Version: "1",
6363
Name: "ASLR inspection detected",
6464
Description: "The ASLR (address space layout randomization) configuration was inspected. ASLR is used by Linux to prevent memory vulnerabilities. An adversary may want to inspect and change the ASLR configuration in order to avoid detection.",

signatures/golang/cgroup_notify_on_release_modification.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ func (sig *CgroupNotifyOnReleaseModification) Init(cb detect.SignatureHandler) e
2323

2424
func (sig *CgroupNotifyOnReleaseModification) GetMetadata() (detect.SignatureMetadata, error) {
2525
return detect.SignatureMetadata{
26-
ID: "TRC-30",
26+
ID: "TRC-106",
2727
Version: "1",
2828
Name: "Cgroups notify_on_release file modification",
2929
Description: "An attempt to modify Cgroup notify_on_release file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",

signatures/golang/cgroup_notify_on_release_modification_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestCgroupNotifyOnReleaseModification(t *testing.T) {
3838
},
3939
},
4040
Findings: map[string]detect.Finding{
41-
"TRC-30": {
41+
"TRC-106": {
4242
Data: nil,
4343
Event: trace.Event{
4444
EventName: "security_file_open",
@@ -58,7 +58,7 @@ func TestCgroupNotifyOnReleaseModification(t *testing.T) {
5858
},
5959
}.ToProtocol(),
6060
SigMetadata: detect.SignatureMetadata{
61-
ID: "TRC-30",
61+
ID: "TRC-106",
6262
Version: "1",
6363
Name: "Cgroups notify_on_release file modification",
6464
Description: "An attempt to modify Cgroup notify_on_release file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",

signatures/golang/cgroup_release_agent_modification.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ func (sig *CgroupReleaseAgentModification) Init(cb detect.SignatureHandler) erro
2323

2424
func (sig *CgroupReleaseAgentModification) GetMetadata() (detect.SignatureMetadata, error) {
2525
return detect.SignatureMetadata{
26-
ID: "TRC-95",
26+
ID: "TRC-1010",
2727
Version: "1",
2828
Name: "Cgroups release agent file modification",
2929
Description: "An attempt to modify Cgroup release agent file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",

signatures/golang/cgroup_release_agent_modification_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestCgroupReleaseAgentModification(t *testing.T) {
3838
},
3939
},
4040
Findings: map[string]detect.Finding{
41-
"TRC-95": {
41+
"TRC-1010": {
4242
Data: nil,
4343
Event: trace.Event{
4444
EventName: "security_file_open",
@@ -58,7 +58,7 @@ func TestCgroupReleaseAgentModification(t *testing.T) {
5858
},
5959
}.ToProtocol(),
6060
SigMetadata: detect.SignatureMetadata{
61-
ID: "TRC-95",
61+
ID: "TRC-1010",
6262
Version: "1",
6363
Name: "Cgroups release agent file modification",
6464
Description: "An attempt to modify Cgroup release agent file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",
@@ -90,7 +90,7 @@ func TestCgroupReleaseAgentModification(t *testing.T) {
9090
},
9191
},
9292
Findings: map[string]detect.Finding{
93-
"TRC-95": {
93+
"TRC-1010": {
9494
Data: nil,
9595
Event: trace.Event{
9696
EventName: "security_inode_rename",
@@ -104,7 +104,7 @@ func TestCgroupReleaseAgentModification(t *testing.T) {
104104
},
105105
}.ToProtocol(),
106106
SigMetadata: detect.SignatureMetadata{
107-
ID: "TRC-95",
107+
ID: "TRC-1010",
108108
Version: "1",
109109
Name: "Cgroups release agent file modification",
110110
Description: "An attempt to modify Cgroup release agent file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",

signatures/golang/core_pattern_modification.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ func (sig *CorePatternModification) Init(cb detect.SignatureHandler) error {
2323

2424
func (sig *CorePatternModification) GetMetadata() (detect.SignatureMetadata, error) {
2525
return detect.SignatureMetadata{
26-
ID: "TRC-28",
26+
ID: "TRC-1011",
2727
Version: "1",
2828
Name: "Core dumps configuration file modification detected",
2929
Description: "Modification of the core dump configuration file (core_pattern) detected. Core dumps are usually written to disk when a program crashes. Certain modifications enable container escaping through the kernel core_pattern feature.",

signatures/golang/core_pattern_modification_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestCorePatternModification(t *testing.T) {
3838
},
3939
},
4040
Findings: map[string]detect.Finding{
41-
"TRC-28": {
41+
"TRC-1011": {
4242
Data: nil,
4343
Event: trace.Event{
4444
EventName: "security_file_open",
@@ -58,7 +58,7 @@ func TestCorePatternModification(t *testing.T) {
5858
},
5959
}.ToProtocol(),
6060
SigMetadata: detect.SignatureMetadata{
61-
ID: "TRC-28",
61+
ID: "TRC-1011",
6262
Version: "1",
6363
Name: "Core dumps configuration file modification detected",
6464
Description: "Modification of the core dump configuration file (core_pattern) detected. Core dumps are usually written to disk when a program crashes. Certain modifications enable container escaping through the kernel core_pattern feature.",

0 commit comments

Comments
 (0)