Skip to content

A series of cloud focused KQL queries for threat hunting and DFIR

Notifications You must be signed in to change notification settings

KernelCaleb/Kustonomicon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Kustonomicon

  _              _                              _                 
 | |            | |                            (_)                
 | | ___   _ ___| |_ ___  _ __   ___  _ __ ___  _  ___ ___  _ __  
 | |/ / | | / __| __/ _ \| '_ \ / _ \| '_ ` _ \| |/ __/ _ \| '_ \ 
 |   <| |_| \__ \ || (_) | | | | (_) | | | | | | | (_| (_) | | | |
 |_|\_\\__,_|___/\__\___/|_| |_|\___/|_| |_| |_|_|\___\___/|_| |_|
                                                      

About

Note: this repo is a work in progress and will be updated over the course of the year. Check back later for additional content and thanks for stopping by!

Inspired by the fantastic KQL community.

100 Days of KQL

Date Title Description Log Source Table Name
2025-01-01 AAD - CAP: Conditional Access Policy Modified Detect changes to CAPs Azure Active Directory AuditLogs
2025-01-02 AAD - App: New Credential Added to SPN Detect when a Secret/Certificate is added to AAD App Registration Azure Active Directory AuditLogs
2025-01-03 Azure Activity: Public Access Enabled on Storage Account Detect when a request is made to enable public access on a storage account Azure Storage Account AzureActivity
2025-01-04 Azure Activity: New IP Address Added to Storage Account Firewall Detect when a new or unknown IP address has been added to a storage account network acl Azure Storage Account AzureActivity
2025-01-05 Azure Storage Account: Mass Download Detect when a large number of unique blobs have been downloaded in a short period of time Azure Storage Account StorageBlobLogs
2025-01-06 Azure Key Vault: New IP Address Added to Firewall Detect when a new or unknown IP address has been added to a Key Vault network acl Azure Key Vault AzureDiagnostics
2025-01-07 Azure Key Vault: Access Configuration Modified Detect when a Key Vault access configuration is changed from RBAC to Vault Access Policy Azure Key Vault AzureDiagnostics
2025-01-08 Azure Key Vault: Large Number of Items Deleted in Short Period of Time Detect when a large number of Key Vault items are deleted in a short time Azure Key Vault AzureDiagnostics
2025-01-09 Azure Key Vault: Large Number of Items Accessed in Short Period of Time Detect when a large number of Key Vault items are accessed by a single caller in a short time Azure Key Vault AzureDiagnostics
2025-01-10 Azure Key Vault: Potential Privilege Escalation Detect when a key vault access configuration is modified and a caller then grants themselves access to the vault Azure Key Vault AzureDiagnostics
2025-01-11 AWS CloudTrail: CVE-2024-50603 Potential Exploitation Activity Detection potential exploitation activity related to CVE-2024-50603 AWS CloudTrail AWSCloudTrail
2025-01-12 AWS CloudTrail: New Access Key Created for Root User Detect when a new access key has been created for root AWS CloudTrail AWSCloudTrail
2025-01-13 AWS CloudTrail: CloudTrail Logging Stopped Detect when a CloudTrail log has been stopped AWS CloudTrail AWSCloudTrail
2025-01-14 AWS CloudTrail: Console Login Without MFA Detect console login events without MFA AWS CloudTrail AWSCloudTrail
2025-01-15 AWS CloudTrail: Failed Login from Root User Detect failed logins from the Root account AWS CloudTrail AWSCloudTrail
2025-01-16 AWS CloudTrail: AWS VPC - Changes to Inbound Rules Allowing Management Ports Detect when an AWS security group rule is added or modified to allow access to ports 22, 3389, or -1 AWS VPC AWSCloudTrail
2025-01-17 AWS CloudTrail: AWS S3 - Changes to Block Public Access Settings Detect changes to S3 public access protection settins AWS S3 AWSCloudTrail
2025-01-18 AzureActivity - NSG: Changes to Inbound Rules Allowing Management Ports Detect when an Azure NSG rule has an inbound rule added/modified that allows access to ports 22, 3389, or * Azure NSG AzureActivity
2025-01-19 Azure Key Vault - User Adds Themselves to a Vault Access Policy Detect when a user adds themselves to a vault access policy, a known privesc attack path Azure Key Vault AzureDiagnostics
2025-01-20 MDE: MDE Exclusion Added or Modified Detect when an MDE exclusion is added or modified Microsoft Defender for Endpoint DeviceRegistryEvents, DeviceProcessEvents
2025-01-21 AzureActivity - VM: Password Reset through EnableAccess VM Extension Detect when a VMs admin account is reset through the EnableAccess extension Azure VM AzureActivity
2025-01-22 AzureActivity - VM: Azure Run Command Started on VM Detect when the Run Command is started on a VM Azure VM AzureActivity
2025-01-23 AAD - SigninLogs: Multiple valid Microsoft Entra ID (AAD) users failing to authenticate from same source IP Multiple AAD accounts with failed logins from same source IP in short time Azure Active Directory SigninLogs
2025-01-24 AAD - CAP: Conditional Access Policy Deleted Detect when a CAP is deleted Azure AD - CAP AuditLogs
2025-01-25 Azure AD - App/OAuth: Admin Consented to Risky API Permissions Detect when an admin grants consent to risky api permissions on behalf of an organization Azure AD - App/Oauth AuditLogs
2025-01-26 Azure AD - SigninLogs: Large Number of Failed Logins Followed by a Successful Login to the Azure Portal Successful login to Azure Portal after a series of failed logins Azure AD SigninLogs
2025-01-27 Azure AD - CAP: New Trusted Location Created This query detects when a new Trusted Location has been created Azure AD - CAP AuditLogs
2025-01-28 Azure AD - CAP: Named Location Modified This query detects a named location has been modified Azure AD - CAP AuditLogs
2025-01-29 Azure AD - CAP: Trusted Location Modified This query detects when a trusted location has been modified or a standard named location has been set as trusted Azure AD - CAP AuditLogs
2025-01-30 Azure Activity: Diagnostic Setting Deleted) This query detects when an Azure resource's diagnostic settings have been deleted Azure Activity - Insights AzureActivity
2025-01-31 Azure Activity: Diagnostic Setting Modified This query detects when an Azure resource's diagnostic settings have been modified Azure Activity - Insights AzureActivity
2025-02-01 Azure Activity: Privileged Role Assigned to Resource This query detects when a built-in privileged Azure RBAC role has been assigned Azure Activity - RBAC AzureActivity
2025-02-02 Azure Activity: Privileged Role Assigned to Subscription This query detects when a principal is assigned a privileged built-in role to an Azure subscription Azure AD - Roles AzureActivity
2025-02-03 Azure Activity - Firewall: Firewall Policy Updated This query detects when an Azure Firewall policy is modified Azure Firewall AzureActivity
2025-02-04 Azure AD: Risky Sign-In to Azure Portal This query detects when there is a risky sign-in to the Azure Portal AAD Identity Protection SigninLogs
2025-02-05 Azure Activity - VM: Multiple VMs Deleted in a Short Period of Time by Single Caller This query detects when a single caller deletes a large number of VMs in a short period of time, 1 hour Azure VMs AzureActivity
2025-02-06 Azure Activity - VM: Disk Exported Through SAS URL This query detects when a SAS URL to download a VM disk is generated Azure VMs AzureActivity
2025-02-07 Azure Activity - NSG: NSG Deleted This query detects when a NSG is deleted Azure Network - NSG AzureActivity
2025-02-08 Azure Activity - NIC: NIC Modified This query detects when a NIC is modified Network Interfaces AzureActivity
2025-02-09 Azure Activity - ST: Storage Account Container Deleted This query detects when a Storage Account Container is deleted Storage Account AzureActivity
2025-02-10 UPDATE ME AAD - PIM: Privileged AD Role Assigned to Principal This query will detect when a privileged Azure AD role has been assigned to a principal AAD PIM AuditLogs
2025-02-11 UPDATE ME Azure AD: Successful Sign-In from BG Account This query detects when there is successful sign-in from a BG account Azure AD SigninLogs
2025-02-12 Azure AD: Administrator Password Reset by Another Administrator This query detects when an administrator changes the password of another administrator Azure AD AuditLogs
2025-02-13 Azure AD - PIM: Role Assigned to Group This query detects when an Azure AD role has been assigned to a gorup Azure AD - PIM AuditLogs
2025-02-14 Azure Activity - Security Insights: Alert Rule Modified This query detects when an Alert Rule or Analytic Rule has been modified Azure Acitivity - Security Insights AzureActivity
2025-02-15 Azure Activity - Security Insights: Alert Rule Deleted This query detects when an Alert Rule or Analytic Rule has been deleted Azure Acitivity - Security Insights AzureActivity
2025-02-16 MDE: RUNDLL32.EXE With Empty Process Command Line This query detects when rundll32.exe is ran with an empty process command line MDE DeviceProcessEvents
2025-02-17 Azure AD: New Tenant Added to Cross Tenant Access This query detects when a new tenant has been added to the cross tenant access settings Azure AD AuditLogs
2025-02-18 ... ... ... ...
2025-02-19 ... ... ... ...
2025-02-20 ... ... ... ...
2025-02-21 ... ... ... ...
2025-02-22 ... ... ... ...
2025-02-23 ... ... ... ...
2025-02-24 ... ... ... ...
2025-02-25 ... ... ... ...
2025-02-26 ... ... ... ...
2025-02-27 ... ... ... ...
2025-02-28 ... ... ... ...
2025-03-01 AWS - IAM: STS Get-Caller-Identity from the AWS CLI This query detects when aws sts get-caller-identity is executed from the AWS CLI AWS IAM AWSCloudTrail
2025-03-02 AWS IAM: Access Key Created and Deleted in Short Period of Time ... AWS IAM AWSCloudTrail
2025-03-03 AWS IAM: Access Key Created ... AWS IAM AWSCloudTrail
2025-03-04 AWS IAM: Access Key Deleted ... AWS IAM Access Key Deleted
2025-03-05 AWS IAM: Large Volume of Access Keys Created in Short Time ... AWS IAM AWSCloudTrail
2025-03-06 AWS EC2: EC2 Instanced Exported to S3 ... AWS EC2 AWSCloudTrail
2025-03-07 AWS EC2: Unsanctioned EC2 Type Created ... AWS EC2 AWSCloudTrail
2025-03-08 AWS VPC: Security Group Deleted ... AWS VPC AWSCloudTrail
2025-03-09 AWS VPC: VPC With Suspicious Name Created (IOC) ... AWS VPC AWSCloudTrail
2025-03-10 AWS IAM: Federated User Created ... AWS IAM AWSCloudTrail
2025-03-11 AWS IAM: Actions From Federated User ... AWS IAM AWSCloudTrail
2025-03-12 AWS RDS: Snapshot Taken ... AWS RDS AWSCloudTrail
2025-03-13 AWS RDS: Snaptshot Exported to S3 ... AWS RDS AWSCloudTrail
2025-03-14 AWS Secrets Manager: Large Number of Secrets Accessed in Short Time ... AWS Secrets Manager AWSCloudTrail
2025-03-15 AWS Secrets Manager: Large Number of Secrets Deleted in Short Time ... AWS Secrets Manager AWSCloudTrail
2025-03-16 ... ... ... ...
2025-03-17 Azure AD: BitLocker Key Accessed BitLocker Key Accessed Azure AD AuditLogs
2025-03-18 Azure Storage: Storage Account Key Accessed Azure Storage Account Key accessed Azure Storage AzureActivity
2025-03-19 Azure Storage: Multiple Storage Account Keys Accessed in Short Time Multiple Azure Storage Account Keys accessed in short time Azure Storage AzureActivity
2025-03-20 SSM Document Ran on Multiple EC2 Instances An SSM Document was ran on multiple EC2 instances AWS SSM AWSCloudTrail
2025-03-21 ... ... ... ...
2025-03-22 SSM Document Ran but Not Ran in Previous 90 Days An SSM Document was ran within the past 1 day, but has not been run within the previous 90 days AWS SSM AWSCloudTrail
2025-03-23 AWS SSM: SSM Document Ran ... AWS SSM AWSCloudTrail
2025-03-24 ... ... ... ...
2025-03-25 AAD: Role Assigned to Guest ... Azure AD AuditLogs
2025-03-26 AAD: Find Uncommon User-Agent in Sign-In Logs ... Azure AD SignInLogs
2025-03-27 Azure Activity: API Call from IP Not Seen in Previous 90 Days ... Azure API AzureActivity
2025-03-28 ... ... ... ...
2025-03-29 AWS CloudTrail: API Call from IP Not Seen in Previous 90 Days ... AWS CloudTrail AWSCloudTrail
2025-03-30 AWS CloudTrail: API Call from User-Agent Not Seen in Previous 90 days ... AWS CloudTrail AWSCloudTrail
2025-03-31 ... ... ... ...
2025-04-01 Azure AD: Failed SSPR ... Azure AD AuditLogs
2025-04-02 ... ... ... ...
2025-04-03 Azure AD - AuditLogs: Owner Added to App ... Azure AD AuditLogs
2025-04-04 Azure AD - AuditLogs: Guest Account Added as App Owner ... Azure AD AuditLogs
2025-04-05 Azure AD - AuditLogs: Privileged Role Assigned to External Guest Account ... Azure AD AuditLogs
2025-04-06 ... ... ... ...
2025-04-07 Azure Activity: Find Uncommon CallerIpAddresses ... Azure AzureActivity
2025-04-08 ... ... ... ...
2025-04-09 ... ... ... ...
2025-04-10 ... ... ... ...
2025-04-11 ... ... ... ...

Releases

No releases published

Packages

No packages published