Query Details
// Honeypot Threat Intelligence (TI) Data // Mastering the Art of Cyber Deception: Turning the Tables on Attackers with Honeypot Intelligence //Deception is an active defense strategy designed to mislead attackers through the use of traps, lures, decoys, and other tactics. Its purpose is to increase the attackers’ costs and reduce the defenders’ workload. The objective is to gather actionable Threat Intelligence (TI) and utilize this intelligence in our detection processes. The provided KQL sample extracts Honeypot TI from Sentinel UEBA associated with your Entra Tenant. BehaviorAnalytics | where TimeGenerated > ago(90d) | where EventSource == "Azure AD" | where tostring(DevicesInsights.ThreatIntelIndicatorType) has "HoneypotAccess" | summarize arg_max(TimeGenerated, *) by SourceIPAddress | project TimeGenerated, SourceIPAddress, tostring(DevicesInsights.ThreatIntelIndicatorDescription) // MITRE ATT&CK // Network Service Discovery (T1046)
This KQL (Kusto Query Language) query is designed to extract and analyze threat intelligence data related to honeypots from Azure Sentinel's User and Entity Behavior Analytics (UEBA) for a specific Entra Tenant. Here's a simplified breakdown of what the query does:
Data Source: It starts by accessing the BehaviorAnalytics table, which contains behavioral data related to security events.
Time Filter: The query filters the data to include only events generated in the last 90 days (TimeGenerated > ago(90d)).
Event Source: It further narrows down the data to events originating from "Azure AD" (EventSource == "Azure AD").
Honeypot Indicator: The query looks for events that have a threat intelligence indicator type related to "HoneypotAccess" (tostring(DevicesInsights.ThreatIntelIndicatorType) has "HoneypotAccess").
Summarization: It summarizes the data by finding the most recent event (arg_max(TimeGenerated, *)) for each unique source IP address (by SourceIPAddress).
Projection: Finally, it selects and displays specific columns: the time the event was generated (TimeGenerated), the source IP address (SourceIPAddress), and a description of the threat intelligence indicator (tostring(DevicesInsights.ThreatIntelIndicatorDescription)).
The query is part of a strategy to use deception (like honeypots) to gather threat intelligence, which can then be used to enhance detection and defense mechanisms against cyber attackers. The mention of "MITRE ATT&CK" and "Network Service Discovery (T1046)" suggests that the query might be related to identifying or analyzing techniques used by attackers to discover network services, as categorized by the MITRE ATT&CK framework.

Steven Lim
Released: October 19, 2024
Tables
Keywords
Operators