AWS CLI with Kali Linux Fingerprint Identified
editAWS CLI with Kali Linux Fingerprint Identified
editIdentifies the usage of the AWS CLI with a user agent string containing distrib#kali
, which suggests the request was made from a Kali Linux distribution. This may indicate offensive security tooling or unauthorized use of the AWS CLI from a potentially adversarial environment.
Rule type: query
Rule indices:
- logs-aws.cloudtrail-*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-9m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- Domain: Cloud
- Data Source: AWS
- Data Source: Amazon Web Services
- Data Source: AWS CloudTrail
- Tactic: Initial Access
- Use Case: Cloud Threat Detection
- Resources: Investigation Guide
Version: 2
Rule authors:
- Elastic
Rule license: Elastic License v2
Investigation guide
editTriage and Analysis
Investigating AWS CLI with Kali Linux Fingerprint Identified
The user_agent.original
field in AWS CloudTrail logs reveals the operating system and toolchain used to make API calls. The substring distrib#kali
strongly implies the use of Kali Linux, a common OS used by offensive security professionals and adversaries.
Possible Investigation Steps
-
Identify the User: Check
user.name
,user.arn
, andaws.cloudtrail.user_identity.*
to determine which IAM identity was used. -
Review Access Pattern: Correlate API calls from this user agent with sensitive actions such as
PutObject
,CreateUser
,AttachUserPolicy
, etc. - Investigate Source IP: Examine whether the request originated from an expected network or a suspicious VPN or cloud provider address.
-
Check for Initial Access: Look for session tokens being issued (e.g.,
GetSessionToken
) or reused (AssumeRole
) prior to this event.
False Positive Analysis
- Rare but possible in security assessments or internal red teaming. Validate the action context (user, IP, time of day, etc).
Response and Remediation
- Revoke Credentials: If unauthorized, revoke keys or sessions immediately.
- Harden IAM Policies: Restrict sensitive IAM privileges, especially if used by CI/CD or automation roles.
-
Alert on Repeat Usage: Add recurring monitoring for suspicious user agents including
kali
,curl
, or known toolkits.
Rule query
editevent.dataset: "aws.cloudtrail" and user_agent.original: (aws-cli*distrib#kali* or Boto3*distrib#kali*)
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Initial Access
- ID: TA0001
- Reference URL: https://attack.mitre.org/tactics/TA0001/
-
Technique:
- Name: Valid Accounts
- ID: T1078
- Reference URL: https://attack.mitre.org/techniques/T1078/
-
Sub-technique:
- Name: Cloud Accounts
- ID: T1078.004
- Reference URL: https://attack.mitre.org/techniques/T1078/004/