behavior/rules/macos/defense_evasion_killall_execution_via_python.toml (32 lines of code) (raw):
[rule]
description = "Detects when Python executes the Killall binary in order to kill a process."
id = "3e176b0d-3dfd-44ae-8b75-9569463edde5"
license = "Elastic License v2"
name = "Killall Execution via Python"
os_list = ["macos"]
version = "1.0.2"
query = '''
process where event.type == "start" and event.action == "exec" and process.parent.name like~ "python*" and process.name == "killall"
'''
min_endpoint_version = "8.10.2"
optional_actions = []
[[actions]]
action = "kill_process"
field = "process.parent.entity_id"
state = 0
[[threat]]
framework = "MITRE ATT&CK"
[[threat.technique]]
id = "T1562"
name = "Impair Defenses"
reference = "https://attack.mitre.org/techniques/T1562/"
[[threat.technique.subtechnique]]
id = "T1562.001"
name = "Disable or Modify Tools"
reference = "https://attack.mitre.org/techniques/T1562/001/"
[threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"
[internal]
min_endpoint_version = "8.10.2"