Potential Disabling of SELinux

Identifies potential attempts to disable Security-Enhanced Linux (SELinux), which is a Linux kernel security feature to support access control policies. Adversaries may disable security tools to avoid possible detection of their tools and activities.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2020/04/22"
 3integration = ["endpoint"]
 4maturity = "production"
 5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
 6min_stack_version = "8.3.0"
 7updated_date = "2023/02/22"
 8
 9[rule]
10author = ["Elastic"]
11description = """
12Identifies potential attempts to disable Security-Enhanced Linux (SELinux), which is a Linux kernel security feature to
13support access control policies. Adversaries may disable security tools to avoid possible detection of their tools and
14activities.
15"""
16from = "now-9m"
17index = ["auditbeat-*", "logs-endpoint.events.*", "endgame-*"]
18language = "kuery"
19license = "Elastic License v2"
20name = "Potential Disabling of SELinux"
21risk_score = 47
22rule_id = "eb9eb8ba-a983-41d9-9c93-a1c05112ca5e"
23severity = "medium"
24tags = ["Elastic", "Host", "Linux", "Threat Detection", "Defense Evasion", "Elastic Endgame"]
25timestamp_override = "event.ingested"
26type = "query"
27
28query = '''
29event.category:process and host.os.type:linux and event.type:(start or process_started) and process.name:setenforce and process.args:0
30'''
31
32
33[[rule.threat]]
34framework = "MITRE ATT&CK"
35[[rule.threat.technique]]
36id = "T1562"
37name = "Impair Defenses"
38reference = "https://attack.mitre.org/techniques/T1562/"
39[[rule.threat.technique.subtechnique]]
40id = "T1562.001"
41name = "Disable or Modify Tools"
42reference = "https://attack.mitre.org/techniques/T1562/001/"
43
44
45
46[rule.threat.tactic]
47id = "TA0005"
48name = "Defense Evasion"
49reference = "https://attack.mitre.org/tactics/TA0005/"

to-top