On December 24, 2020 the CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY (CISA) released a Powershell script called Sparrow. According to the github readme Sparrow:
Sparrow.ps1 was created by CISA’s Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment. The tool is intended for use by incident responders, and focuses on the narrow scope of user and application activity endemic to identity and authentication based attacks seen recently in multiple sectors. It is neither comprehensive nor exhaustive of available data, and is intended to narrow a larger set of available investigation modules and telemetry to those specific to recent attacks on federated identity sources and applications.
Sparrow.ps1 will check and install the required PowerShell modules on the analysis machine, check the unified audit log in Azure/M365 for certain indicators of compromise (IoC’s), list Azure AD domains, and check Azure service principals and their Microsoft Graph API permissions to identify potential malicious activity. The tool then outputs the data into multiple CSV files in a default directory.
Sparrow aims to help incident responders detect possible compromised accounts and applications in Azure/M365 environment.
Learn more at https://github.com/cisagov/Sparrow#azure #blue_team #powershell