input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t164.29.130.76\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"164.29.130.76","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t164.29.130.76\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"164.29.130.76","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49514 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1283275474 streamName: microsoft-windows-security-auditing clientIP: 164.29.130.76 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t79.12.242.9\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"79.12.242.9","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
{ "action": "Logon", "clientport": 49514, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T18:34:41.273Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T18:34:42.641Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t79.12.242.9\\n\\tSource Port:\\t\\t49514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"79.12.242.9\",\"IpPort\":\"49514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":7940}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1283275474,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1283275474", "streamName": "microsoft-windows-security-auditing", "clientIP": "79.12.242.9", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t79.12.242.9\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"79.12.242.9","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t79.12.242.9\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"79.12.242.9","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49514 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1283275474 streamName: microsoft-windows-security-auditing clientIP: 79.12.242.9 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t239.0.77.24\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.0.77.24","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
{ "action": "Logon", "clientport": 49514, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T18:34:41.273Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T18:34:42.641Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-BIOSE\\n\\tSource Network Address:\\t239.0.77.24\\n\\tSource Port:\\t\\t49514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"Nordc-DC-03.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"239.0.77.24\",\"IpPort\":\"49514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-BIOSE\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":7940}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1283275474,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1283275474", "streamName": "microsoft-windows-security-auditing", "clientIP": "239.0.77.24", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t239.0.77.24\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.0.77.24","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T18:34:41.273Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T18:34:42.641Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-BIOSE\n\tSource Network Address:\t239.0.77.24\n\tSource Port:\t\t49514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"Nordc-DC-03.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.0.77.24","IpPort":"49514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-BIOSE"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":7940}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1283275474,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 49514 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1283275474 streamName: microsoft-windows-security-auditing clientIP: 239.0.77.24 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.203.72.242 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"167.228.12.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.203.72.242","location":{"city":"New Orleans","country":"United States","state":"Louisiana"},"name":"870-421-7706"},"email":"bob@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T13:51:17.962582+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660139477,"txid":"fb8088b7-4ddd-4a53-a1f0-d232685469f7","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2M2AQKT0YLZADWNOFG","name":"bob"}} ::: program=null ::: clientIP=167.228.12.99 ::: userName=bob ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660139477", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "174.203.72.242", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.203.72.242 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"167.228.12.99\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"174.203.72.242\",\"location\":{\"city\":\"New Orleans\",\"country\":\"United States\",\"state\":\"Louisiana\"},\"name\":\"870-421-7706\"},\"email\":\"bob@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-10T13:51:17.962582+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1660139477,\"txid\":\"fb8088b7-4ddd-4a53-a1f0-d232685469f7\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU2M2AQKT0YLZADWNOFG\",\"name\":\"bob\"}} ::: program=null ::: clientIP=167.228.12.99 ::: userName=bob ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "167.228.12.99", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.203.72.242 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"167.228.12.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.203.72.242","location":{"city":"New Orleans","country":"United States","state":"Louisiana"},"name":"870-421-7706"},"email":"bob@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T13:51:17.962582+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660139477,"txid":"fb8088b7-4ddd-4a53-a1f0-d232685469f7","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2M2AQKT0YLZADWNOFG","name":"bob"}} ::: program=null ::: clientIP=167.228.12.99 ::: userName=bob ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.203.72.242 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"167.228.12.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.203.72.242","location":{"city":"New Orleans","country":"United States","state":"Louisiana"},"name":"870-421-7706"},"email":"bob@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T13:51:17.962582+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660139477,"txid":"fb8088b7-4ddd-4a53-a1f0-d232685469f7","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2M2AQKT0YLZADWNOFG","name":"bob"}} ::: program=null ::: clientIP=167.228.12.99 ::: userName=bob ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660139477 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 174.203.72.242 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 167.228.12.99 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.203.72.242 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"37.40.145.69","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.203.72.242","location":{"city":"New Orleans","country":"United States","state":"Louisiana"},"name":"870-421-7706"},"email":"alice@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T13:51:17.962582+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660139477,"txid":"fb8088b7-4ddd-4a53-a1f0-d232685469f7","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2M2AQKT0YLZADWNOFG","name":"alice"}} ::: program=null ::: clientIP=37.40.145.69 ::: userName=alice ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660139477", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "174.203.72.242", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.203.72.242 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"37.40.145.69\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"174.203.72.242\",\"location\":{\"city\":\"New Orleans\",\"country\":\"United States\",\"state\":\"Louisiana\"},\"name\":\"870-421-7706\"},\"email\":\"alice@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-10T13:51:17.962582+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1660139477,\"txid\":\"fb8088b7-4ddd-4a53-a1f0-d232685469f7\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU2M2AQKT0YLZADWNOFG\",\"name\":\"alice\"}} ::: program=null ::: clientIP=37.40.145.69 ::: userName=alice ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "37.40.145.69", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.203.72.242 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"37.40.145.69","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.203.72.242","location":{"city":"New Orleans","country":"United States","state":"Louisiana"},"name":"870-421-7706"},"email":"alice@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T13:51:17.962582+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660139477,"txid":"fb8088b7-4ddd-4a53-a1f0-d232685469f7","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2M2AQKT0YLZADWNOFG","name":"alice"}} ::: program=null ::: clientIP=37.40.145.69 ::: userName=alice ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.203.72.242 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"37.40.145.69","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.203.72.242","location":{"city":"New Orleans","country":"United States","state":"Louisiana"},"name":"870-421-7706"},"email":"alice@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T13:51:17.962582+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660139477,"txid":"fb8088b7-4ddd-4a53-a1f0-d232685469f7","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2M2AQKT0YLZADWNOFG","name":"alice"}} ::: program=null ::: clientIP=37.40.145.69 ::: userName=alice ::: created_at=1660139477 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139477 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660139477 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 174.203.72.242 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 37.40.145.69 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.87.229.81 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"126.180.74.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.87.229.81","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"404-578-5449"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T14:56:17.950204+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143377,"txid":"3199bbce-4a8f-4e11-86b4-f3fceec68046","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUKG2RTZDNNCA1SE9TO0","name":"bob"}} ::: program=null ::: clientIP=126.180.74.214 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660143377", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "96.87.229.81", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.87.229.81 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"126.180.74.214\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"96.87.229.81\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"404-578-5449\"},\"email\":\"bob@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-10T14:56:17.950204+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1660143377,\"txid\":\"3199bbce-4a8f-4e11-86b4-f3fceec68046\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUKG2RTZDNNCA1SE9TO0\",\"name\":\"bob\"}} ::: program=null ::: clientIP=126.180.74.214 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "126.180.74.214", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.87.229.81 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"126.180.74.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.87.229.81","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"404-578-5449"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T14:56:17.950204+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143377,"txid":"3199bbce-4a8f-4e11-86b4-f3fceec68046","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUKG2RTZDNNCA1SE9TO0","name":"bob"}} ::: program=null ::: clientIP=126.180.74.214 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.87.229.81 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"126.180.74.214","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.87.229.81","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"404-578-5449"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T14:56:17.950204+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143377,"txid":"3199bbce-4a8f-4e11-86b4-f3fceec68046","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUKG2RTZDNNCA1SE9TO0","name":"bob"}} ::: program=null ::: clientIP=126.180.74.214 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660143377 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 96.87.229.81 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 126.180.74.214 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.87.229.81 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"23.37.87.224","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.87.229.81","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"404-578-5449"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T14:56:17.950204+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143377,"txid":"3199bbce-4a8f-4e11-86b4-f3fceec68046","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUKG2RTZDNNCA1SE9TO0","name":"bob"}} ::: program=null ::: clientIP=23.37.87.224 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660143377", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "96.87.229.81", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.87.229.81 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"23.37.87.224\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"96.87.229.81\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"404-578-5449\"},\"email\":\"bob@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-10T14:56:17.950204+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1660143377,\"txid\":\"3199bbce-4a8f-4e11-86b4-f3fceec68046\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUKG2RTZDNNCA1SE9TO0\",\"name\":\"bob\"}} ::: program=null ::: clientIP=23.37.87.224 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "23.37.87.224", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.87.229.81 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"23.37.87.224","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.87.229.81","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"404-578-5449"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T14:56:17.950204+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143377,"txid":"3199bbce-4a8f-4e11-86b4-f3fceec68046","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUKG2RTZDNNCA1SE9TO0","name":"bob"}} ::: program=null ::: clientIP=23.37.87.224 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.87.229.81 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"23.37.87.224","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"96.87.229.81","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"404-578-5449"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-10T14:56:17.950204+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143377,"txid":"3199bbce-4a8f-4e11-86b4-f3fceec68046","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUKG2RTZDNNCA1SE9TO0","name":"bob"}} ::: program=null ::: clientIP=23.37.87.224 ::: userName=bob ::: created_at=1660143377 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143377 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660143377 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 96.87.229.81 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 23.37.87.224 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"159.86.186.167","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-08-10T14:50:31.811043+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1660143031,"txid":"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=159.86.186.167 ::: userName=janedoe ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660143031", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"159.86.186.167\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-08-10T14:50:31.811043+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1660143031,\"txid\":\"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"janedoe\"}} ::: program=null ::: clientIP=159.86.186.167 ::: userName=janedoe ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "159.86.186.167", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"159.86.186.167","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-08-10T14:50:31.811043+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1660143031,"txid":"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=159.86.186.167 ::: userName=janedoe ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"159.86.186.167","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-08-10T14:50:31.811043+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1660143031,"txid":"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=159.86.186.167 ::: userName=janedoe ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660143031 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 159.86.186.167 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"130.125.254.141","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-08-10T14:50:31.811043+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1660143031,"txid":"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.125.254.141 ::: userName=charlie ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660143031", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"130.125.254.141\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-08-10T14:50:31.811043+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1660143031,\"txid\":\"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=130.125.254.141 ::: userName=charlie ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "130.125.254.141", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"130.125.254.141","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-08-10T14:50:31.811043+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1660143031,"txid":"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.125.254.141 ::: userName=charlie ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"130.125.254.141","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-08-10T14:50:31.811043+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1660143031,"txid":"3818c78a-f0ce-4432-b8dd-eb5cc3f3503d","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.125.254.141 ::: userName=charlie ::: created_at=1660143031 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143031 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660143031 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 130.125.254.141 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"37.89.114.27","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"770-519-8541"},"email":"nighthawk@umbrella.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-10T14:57:05.185885+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143425,"txid":"7ff5135c-7b85-4765-9343-1866983a6720","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUQ8F05OD0QJIX57OXBJ","name":"nighthawk"}} ::: program=null ::: clientIP=37.89.114.27 ::: userName=nighthawk ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660143425", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"37.89.114.27\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"770-519-8541\"},\"email\":\"nighthawk@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"phone_call\",\"isotimestamp\":\"2022-08-10T14:57:05.185885+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1660143425,\"txid\":\"7ff5135c-7b85-4765-9343-1866983a6720\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUQ8F05OD0QJIX57OXBJ\",\"name\":\"nighthawk\"}} ::: program=null ::: clientIP=37.89.114.27 ::: userName=nighthawk ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "37.89.114.27", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"37.89.114.27","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"770-519-8541"},"email":"nighthawk@umbrella.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-10T14:57:05.185885+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143425,"txid":"7ff5135c-7b85-4765-9343-1866983a6720","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUQ8F05OD0QJIX57OXBJ","name":"nighthawk"}} ::: program=null ::: clientIP=37.89.114.27 ::: userName=nighthawk ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"37.89.114.27","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"770-519-8541"},"email":"nighthawk@umbrella.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-10T14:57:05.185885+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143425,"txid":"7ff5135c-7b85-4765-9343-1866983a6720","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUQ8F05OD0QJIX57OXBJ","name":"nighthawk"}} ::: program=null ::: clientIP=37.89.114.27 ::: userName=nighthawk ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660143425 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 37.89.114.27 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"82.134.61.162","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"770-519-8541"},"email":"charlie@umbrella.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-10T14:57:05.185885+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143425,"txid":"7ff5135c-7b85-4765-9343-1866983a6720","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUQ8F05OD0QJIX57OXBJ","name":"charlie"}} ::: program=null ::: clientIP=82.134.61.162 ::: userName=charlie ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1660143425", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"82.134.61.162\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"770-519-8541\"},\"email\":\"charlie@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"phone_call\",\"isotimestamp\":\"2022-08-10T14:57:05.185885+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1660143425,\"txid\":\"7ff5135c-7b85-4765-9343-1866983a6720\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUQ8F05OD0QJIX57OXBJ\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=82.134.61.162 ::: userName=charlie ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "82.134.61.162", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"82.134.61.162","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"770-519-8541"},"email":"charlie@umbrella.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-10T14:57:05.185885+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143425,"txid":"7ff5135c-7b85-4765-9343-1866983a6720","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUQ8F05OD0QJIX57OXBJ","name":"charlie"}} ::: program=null ::: clientIP=82.134.61.162 ::: userName=charlie ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"82.134.61.162","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"770-519-8541"},"email":"charlie@umbrella.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-10T14:57:05.185885+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1660143425,"txid":"7ff5135c-7b85-4765-9343-1866983a6720","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUQ8F05OD0QJIX57OXBJ","name":"charlie"}} ::: program=null ::: clientIP=82.134.61.162 ::: userName=charlie ::: created_at=1660143425 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660143425 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1660143425 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 82.134.61.162 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t142.194.177.161\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.194.177.161","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
{ "action": "Logon", "clientport": 56582, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-01T14:07:40.004Z\",\"agent\":{\"ephemeral_id\":\"44a49e96-f614-4456-bba9-da2c9767282a\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-01T14:07:41.160Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tLT00977\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00977\\n\\tSource Network Address:\\t142.194.177.161\\n\\tSource Port:\\t\\t56582\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"142.194.177.161\",\"IpPort\":\"56582\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00977\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00977\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2556}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":79378888,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "79378888", "streamName": "microsoft-windows-security-auditing", "clientIP": "142.194.177.161", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t142.194.177.161\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.194.177.161","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t142.194.177.161\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.194.177.161","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56582 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 79378888 streamName: microsoft-windows-security-auditing clientIP: 142.194.177.161 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t114.183.33.50\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"114.183.33.50","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
{ "action": "Logon", "clientport": 56582, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-01T14:07:40.004Z\",\"agent\":{\"ephemeral_id\":\"44a49e96-f614-4456-bba9-da2c9767282a\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-01T14:07:41.160Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT00977\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00977\\n\\tSource Network Address:\\t114.183.33.50\\n\\tSource Port:\\t\\t56582\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"114.183.33.50\",\"IpPort\":\"56582\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00977\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00977\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2556}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":79378888,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "79378888", "streamName": "microsoft-windows-security-auditing", "clientIP": "114.183.33.50", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t114.183.33.50\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"114.183.33.50","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t114.183.33.50\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"114.183.33.50","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56582 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 79378888 streamName: microsoft-windows-security-auditing clientIP: 114.183.33.50 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t93.80.200.199\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC2.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"93.80.200.199","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
{ "action": "Logon", "clientport": 56582, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-01T14:07:40.004Z\",\"agent\":{\"ephemeral_id\":\"44a49e96-f614-4456-bba9-da2c9767282a\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-01T14:07:41.160Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tLT00977\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00977\\n\\tSource Network Address:\\t93.80.200.199\\n\\tSource Port:\\t\\t56582\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC2.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"93.80.200.199\",\"IpPort\":\"56582\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00977\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00977\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2556}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":79378888,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "79378888", "streamName": "microsoft-windows-security-auditing", "clientIP": "93.80.200.199", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t93.80.200.199\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC2.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"93.80.200.199","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t93.80.200.199\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC2.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"93.80.200.199","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56582 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 79378888 streamName: microsoft-windows-security-auditing clientIP: 93.80.200.199 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t120.5.84.145\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"120.5.84.145","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
{ "action": "Logon", "clientport": 56582, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-01T14:07:40.004Z\",\"agent\":{\"ephemeral_id\":\"44a49e96-f614-4456-bba9-da2c9767282a\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-01T14:07:41.160Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tLT00977\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT00977\\n\\tSource Network Address:\\t120.5.84.145\\n\\tSource Port:\\t\\t56582\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"120.5.84.145\",\"IpPort\":\"56582\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT00977\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT00977\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2556}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":79378888,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "79378888", "streamName": "microsoft-windows-security-auditing", "clientIP": "120.5.84.145", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t120.5.84.145\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"120.5.84.145","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-01T14:07:40.004Z","agent":{"ephemeral_id":"44a49e96-f614-4456-bba9-da2c9767282a","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-01T14:07:41.160Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT00977\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT00977\n\tSource Network Address:\t120.5.84.145\n\tSource Port:\t\t56582\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"120.5.84.145","IpPort":"56582","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT00977","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT00977"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2556}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":79378888,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 56582 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 79378888 streamName: microsoft-windows-security-auditing clientIP: 120.5.84.145 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=128.8.13.80 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00155d4a00da", "filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\charlie\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=128.8.13.80 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-06-12T13:04:28Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "128.8.13.80", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=128.8.13.80 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=128.8.13.80 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00155d4a00da filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 filename: setup.exe filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-06-12T13:04:28Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 128.8.13.80 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\bob\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\bob\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=194.33.53.61 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\bob\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00155d4a00da", "filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\bob\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\bob\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=194.33.53.61 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\bob\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-06-12T13:04:28Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "194.33.53.61", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\bob\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\bob\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=194.33.53.61 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\bob\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\bob\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\bob\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=194.33.53.61 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\bob\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=bob ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00155d4a00da filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 filename: setup.exe filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-06-12T13:04:28Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 194.33.53.61 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=160.116.155.125 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00155d4a00da", "filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\janedoe\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\janedoe\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=160.116.155.125 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-06-12T13:04:28Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "160.116.155.125", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=160.116.155.125 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=160.116.155.125 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00155d4a00da filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 filename: setup.exe filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-06-12T13:04:28Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 160.116.155.125 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=73.106.19.29 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"103.116.174.155","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"73.106.19.29","key":"DPKZLQUHZID4DCRUAEL7","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-614-6336"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-12-13T22:43:31.981315+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1670971411,"txid":"2e9eb711-6b58-47fa-9848-138ab185d573","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2Z8R1NVJ0LZS3H1MW7","name":"charlie"}} ::: program=null ::: clientIP=103.116.174.155 ::: userName=charlie ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1670971411", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "73.106.19.29", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=73.106.19.29 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"103.116.174.155\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"73.106.19.29\",\"key\":\"DPKZLQUHZID4DCRUAEL7\",\"location\":{\"city\":\"Dacula\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-614-6336\"},\"email\":\"charlie@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-12-13T22:43:31.981315+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1670971411,\"txid\":\"2e9eb711-6b58-47fa-9848-138ab185d573\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU2Z8R1NVJ0LZS3H1MW7\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=103.116.174.155 ::: userName=charlie ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "103.116.174.155", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=73.106.19.29 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"103.116.174.155","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"73.106.19.29","key":"DPKZLQUHZID4DCRUAEL7","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-614-6336"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-12-13T22:43:31.981315+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1670971411,"txid":"2e9eb711-6b58-47fa-9848-138ab185d573","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2Z8R1NVJ0LZS3H1MW7","name":"charlie"}} ::: program=null ::: clientIP=103.116.174.155 ::: userName=charlie ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=73.106.19.29 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"103.116.174.155","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"73.106.19.29","key":"DPKZLQUHZID4DCRUAEL7","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-614-6336"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-12-13T22:43:31.981315+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1670971411,"txid":"2e9eb711-6b58-47fa-9848-138ab185d573","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2Z8R1NVJ0LZS3H1MW7","name":"charlie"}} ::: program=null ::: clientIP=103.116.174.155 ::: userName=charlie ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1670971411 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 73.106.19.29 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 103.116.174.155 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=73.106.19.29 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"198.57.46.174","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"73.106.19.29","key":"DPKZLQUHZID4DCRUAEL7","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-614-6336"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-12-13T22:43:31.981315+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1670971411,"txid":"2e9eb711-6b58-47fa-9848-138ab185d573","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2Z8R1NVJ0LZS3H1MW7","name":"fish"}} ::: program=null ::: clientIP=198.57.46.174 ::: userName=fish ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1670971411", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "73.106.19.29", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS02", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=73.106.19.29 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"198.57.46.174\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"73.106.19.29\",\"key\":\"DPKZLQUHZID4DCRUAEL7\",\"location\":{\"city\":\"Dacula\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-614-6336\"},\"email\":\"fish@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-12-13T22:43:31.981315+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1670971411,\"txid\":\"2e9eb711-6b58-47fa-9848-138ab185d573\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU2Z8R1NVJ0LZS3H1MW7\",\"name\":\"fish\"}} ::: program=null ::: clientIP=198.57.46.174 ::: userName=fish ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "198.57.46.174", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=73.106.19.29 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"198.57.46.174","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"73.106.19.29","key":"DPKZLQUHZID4DCRUAEL7","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-614-6336"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-12-13T22:43:31.981315+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1670971411,"txid":"2e9eb711-6b58-47fa-9848-138ab185d573","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2Z8R1NVJ0LZS3H1MW7","name":"fish"}} ::: program=null ::: clientIP=198.57.46.174 ::: userName=fish ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=73.106.19.29 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"198.57.46.174","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"73.106.19.29","key":"DPKZLQUHZID4DCRUAEL7","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-614-6336"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-12-13T22:43:31.981315+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1670971411,"txid":"2e9eb711-6b58-47fa-9848-138ab185d573","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU2Z8R1NVJ0LZS3H1MW7","name":"fish"}} ::: program=null ::: clientIP=198.57.46.174 ::: userName=fish ::: created_at=1670971411 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670971411 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1670971411 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 73.106.19.29 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS02 streamName: DUO clientIP: 198.57.46.174 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["result=denied","reason=invalid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"131.133.150.174","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@wayne.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:28.286124+00:00","ood_software":null,"reason":"invalid_passcode","result":"denied","timestamp":1670970568,"txid":"d2daa515-3c10-4282-af70-104fd08a70c0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"janedoe"}} ::: program=null ::: clientIP=131.133.150.174 ::: userName=janedoe ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1670970568", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS01", "message": "WitFoo-Artifact ::: tags=[\"result=denied\",\"reason=invalid_passcode\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS01\",\"ip\":\"131.133.150.174\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"janedoe@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"hardware_token\",\"isotimestamp\":\"2022-12-13T22:29:28.286124+00:00\",\"ood_software\":null,\"reason\":\"invalid_passcode\",\"result\":\"denied\",\"timestamp\":1670970568,\"txid\":\"d2daa515-3c10-4282-af70-104fd08a70c0\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8L3BHMXFUYRX4XSZIG\",\"name\":\"janedoe\"}} ::: program=null ::: clientIP=131.133.150.174 ::: userName=janedoe ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "131.133.150.174", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=denied","reason=invalid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"131.133.150.174","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@wayne.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:28.286124+00:00","ood_software":null,"reason":"invalid_passcode","result":"denied","timestamp":1670970568,"txid":"d2daa515-3c10-4282-af70-104fd08a70c0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"janedoe"}} ::: program=null ::: clientIP=131.133.150.174 ::: userName=janedoe ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=denied","reason=invalid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"131.133.150.174","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@wayne.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:28.286124+00:00","ood_software":null,"reason":"invalid_passcode","result":"denied","timestamp":1670970568,"txid":"d2daa515-3c10-4282-af70-104fd08a70c0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"janedoe"}} ::: program=null ::: clientIP=131.133.150.174 ::: userName=janedoe ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1670970568 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS01 streamName: DUO clientIP: 131.133.150.174 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=valid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"210.46.124.35","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DH0SIUY8QVVJFL7C2NF6","location":{"city":null,"country":null,"state":null},"name":"Duo-D100 2788484300GO6OATH"},"email":"janedoe@acme.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:38.956736+00:00","ood_software":null,"reason":"valid_passcode","result":"success","timestamp":1670970578,"txid":"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"janedoe"}} ::: program=null ::: clientIP=210.46.124.35 ::: userName=janedoe ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1670970578", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS01", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=valid_passcode\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS01\",\"ip\":\"210.46.124.35\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":\"DH0SIUY8QVVJFL7C2NF6\",\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"Duo-D100 2788484300GO6OATH\"},\"email\":\"janedoe@acme.com\",\"event_type\":\"authentication\",\"factor\":\"hardware_token\",\"isotimestamp\":\"2022-12-13T22:29:38.956736+00:00\",\"ood_software\":null,\"reason\":\"valid_passcode\",\"result\":\"success\",\"timestamp\":1670970578,\"txid\":\"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8L3BHMXFUYRX4XSZIG\",\"name\":\"janedoe\"}} ::: program=null ::: clientIP=210.46.124.35 ::: userName=janedoe ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "210.46.124.35", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=valid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"210.46.124.35","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DH0SIUY8QVVJFL7C2NF6","location":{"city":null,"country":null,"state":null},"name":"Duo-D100 2788484300GO6OATH"},"email":"janedoe@acme.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:38.956736+00:00","ood_software":null,"reason":"valid_passcode","result":"success","timestamp":1670970578,"txid":"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"janedoe"}} ::: program=null ::: clientIP=210.46.124.35 ::: userName=janedoe ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=valid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"210.46.124.35","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DH0SIUY8QVVJFL7C2NF6","location":{"city":null,"country":null,"state":null},"name":"Duo-D100 2788484300GO6OATH"},"email":"janedoe@acme.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:38.956736+00:00","ood_software":null,"reason":"valid_passcode","result":"success","timestamp":1670970578,"txid":"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"janedoe"}} ::: program=null ::: clientIP=210.46.124.35 ::: userName=janedoe ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1670970578 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS01 streamName: DUO clientIP: 210.46.124.35 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=denied","reason=invalid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"78.61.181.212","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@umbrella.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:28.286124+00:00","ood_software":null,"reason":"invalid_passcode","result":"denied","timestamp":1670970568,"txid":"d2daa515-3c10-4282-af70-104fd08a70c0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"bob"}} ::: program=null ::: clientIP=78.61.181.212 ::: userName=bob ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1670970568", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS01", "message": "WitFoo-Artifact ::: tags=[\"result=denied\",\"reason=invalid_passcode\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS01\",\"ip\":\"78.61.181.212\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"hardware_token\",\"isotimestamp\":\"2022-12-13T22:29:28.286124+00:00\",\"ood_software\":null,\"reason\":\"invalid_passcode\",\"result\":\"denied\",\"timestamp\":1670970568,\"txid\":\"d2daa515-3c10-4282-af70-104fd08a70c0\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8L3BHMXFUYRX4XSZIG\",\"name\":\"bob\"}} ::: program=null ::: clientIP=78.61.181.212 ::: userName=bob ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "78.61.181.212", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=denied","reason=invalid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"78.61.181.212","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@umbrella.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:28.286124+00:00","ood_software":null,"reason":"invalid_passcode","result":"denied","timestamp":1670970568,"txid":"d2daa515-3c10-4282-af70-104fd08a70c0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"bob"}} ::: program=null ::: clientIP=78.61.181.212 ::: userName=bob ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=denied","reason=invalid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"78.61.181.212","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@umbrella.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:28.286124+00:00","ood_software":null,"reason":"invalid_passcode","result":"denied","timestamp":1670970568,"txid":"d2daa515-3c10-4282-af70-104fd08a70c0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"bob"}} ::: program=null ::: clientIP=78.61.181.212 ::: userName=bob ::: created_at=1670970568 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970568 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1670970568 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS01 streamName: DUO clientIP: 78.61.181.212 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=valid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"0.241.222.223","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DH0SIUY8QVVJFL7C2NF6","location":{"city":null,"country":null,"state":null},"name":"Duo-D100 2788484300GO6OATH"},"email":"alice@wayne.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:38.956736+00:00","ood_software":null,"reason":"valid_passcode","result":"success","timestamp":1670970578,"txid":"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"alice"}} ::: program=null ::: clientIP=0.241.222.223 ::: userName=alice ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1670970578", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS01", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=valid_passcode\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS01\",\"ip\":\"0.241.222.223\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":\"DH0SIUY8QVVJFL7C2NF6\",\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"Duo-D100 2788484300GO6OATH\"},\"email\":\"alice@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"hardware_token\",\"isotimestamp\":\"2022-12-13T22:29:38.956736+00:00\",\"ood_software\":null,\"reason\":\"valid_passcode\",\"result\":\"success\",\"timestamp\":1670970578,\"txid\":\"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8L3BHMXFUYRX4XSZIG\",\"name\":\"alice\"}} ::: program=null ::: clientIP=0.241.222.223 ::: userName=alice ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "0.241.222.223", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=valid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"0.241.222.223","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DH0SIUY8QVVJFL7C2NF6","location":{"city":null,"country":null,"state":null},"name":"Duo-D100 2788484300GO6OATH"},"email":"alice@wayne.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:38.956736+00:00","ood_software":null,"reason":"valid_passcode","result":"success","timestamp":1670970578,"txid":"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"alice"}} ::: program=null ::: clientIP=0.241.222.223 ::: userName=alice ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=valid_passcode"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS01","ip":"0.241.222.223","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DH0SIUY8QVVJFL7C2NF6","location":{"city":null,"country":null,"state":null},"name":"Duo-D100 2788484300GO6OATH"},"email":"alice@wayne.com","event_type":"authentication","factor":"hardware_token","isotimestamp":"2022-12-13T22:29:38.956736+00:00","ood_software":null,"reason":"valid_passcode","result":"success","timestamp":1670970578,"txid":"2a3c01a0-d45a-4d51-b211-c63bcf7aa11c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"alice"}} ::: program=null ::: clientIP=0.241.222.223 ::: userName=alice ::: created_at=1670970578 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1670970578 ::: clientHostname=TS01 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1670970578 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS01 streamName: DUO clientIP: 0.241.222.223 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t101.230.16.60\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"101.230.16.60","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
{ "senderhost": "BODC3.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-06T06:02:55.885Z\",\"agent\":{\"ephemeral_id\":\"86131cfc-cb81-4812-8ebe-9b1c95d95688\",\"id\":\"88cf4cc3-0b4e-438f-acbe-8aeef37b8023\",\"name\":\"BODC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-06T06:02:57.586Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC3.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\twayne\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC3\\n\\tSource Network Address:\\t101.230.16.60\\n\\tSource Port:\\t\\t63801\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"BODC3.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC3.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"101.230.16.60\",\"IpPort\":\"63801\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"wayne\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":1756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6463504,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 63801, "vendorcode": "6463504", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "101.230.16.60", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t101.230.16.60\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"101.230.16.60","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t101.230.16.60\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"101.230.16.60","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC3.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 63801 vendorcode: 6463504 action: Logon streamName: microsoft-windows-security-auditing clientIP: 101.230.16.60 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tstark\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t98.75.63.186\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"98.75.63.186","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"stark","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
{ "senderhost": "BODC3.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-06T06:02:55.885Z\",\"agent\":{\"ephemeral_id\":\"86131cfc-cb81-4812-8ebe-9b1c95d95688\",\"id\":\"88cf4cc3-0b4e-438f-acbe-8aeef37b8023\",\"name\":\"BODC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-06T06:02:57.586Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC3.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tstark\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC3\\n\\tSource Network Address:\\t98.75.63.186\\n\\tSource Port:\\t\\t63801\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"BODC3.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC3.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"98.75.63.186\",\"IpPort\":\"63801\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"stark\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":1756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6463504,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 63801, "vendorcode": "6463504", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "98.75.63.186", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tstark\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t98.75.63.186\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"98.75.63.186","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"stark","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tstark\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t98.75.63.186\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"98.75.63.186","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"stark","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC3.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 63801 vendorcode: 6463504 action: Logon streamName: microsoft-windows-security-auditing clientIP: 98.75.63.186 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t153.210.44.193\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"153.210.44.193","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"oscorp","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
{ "senderhost": "BODC3.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-06T06:02:55.885Z\",\"agent\":{\"ephemeral_id\":\"86131cfc-cb81-4812-8ebe-9b1c95d95688\",\"id\":\"88cf4cc3-0b4e-438f-acbe-8aeef37b8023\",\"name\":\"BODC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-06T06:02:57.586Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC3.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\toscorp\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC3\\n\\tSource Network Address:\\t153.210.44.193\\n\\tSource Port:\\t\\t63801\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"OSCORP (oscorp.oscorpcloud.com)\",\"senderHost\":\"BODC3.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC3.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"153.210.44.193\",\"IpPort\":\"63801\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"oscorp\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":1756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6463504,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 63801, "vendorcode": "6463504", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "153.210.44.193", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t153.210.44.193\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"153.210.44.193","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"oscorp","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\toscorp\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t153.210.44.193\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"153.210.44.193","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"oscorp","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC3.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 63801 vendorcode: 6463504 action: Logon streamName: microsoft-windows-security-auditing clientIP: 153.210.44.193 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t7.89.232.212\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"7.89.232.212","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
{ "senderhost": "BODC3.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-06T06:02:55.885Z\",\"agent\":{\"ephemeral_id\":\"86131cfc-cb81-4812-8ebe-9b1c95d95688\",\"id\":\"88cf4cc3-0b4e-438f-acbe-8aeef37b8023\",\"name\":\"BODC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-06T06:02:57.586Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC3.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\twayne\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC3\\n\\tSource Network Address:\\t7.89.232.212\\n\\tSource Port:\\t\\t63801\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"BODC3.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC3.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"7.89.232.212\",\"IpPort\":\"63801\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"wayne\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":1756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6463504,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 63801, "vendorcode": "6463504", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "7.89.232.212", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t7.89.232.212\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"7.89.232.212","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t7.89.232.212\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"7.89.232.212","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC3.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 63801 vendorcode: 6463504 action: Logon streamName: microsoft-windows-security-auditing clientIP: 7.89.232.212 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tacme\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t27.247.73.2\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"27.247.73.2","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"acme","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
{ "senderhost": "BODC3.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-06T06:02:55.885Z\",\"agent\":{\"ephemeral_id\":\"86131cfc-cb81-4812-8ebe-9b1c95d95688\",\"id\":\"88cf4cc3-0b4e-438f-acbe-8aeef37b8023\",\"name\":\"BODC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-06T06:02:57.586Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC3.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tacme\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC3\\n\\tSource Network Address:\\t27.247.73.2\\n\\tSource Port:\\t\\t63801\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"BODC3.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC3.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"27.247.73.2\",\"IpPort\":\"63801\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"acme\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":1756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6463504,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 63801, "vendorcode": "6463504", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "27.247.73.2", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tacme\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t27.247.73.2\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"27.247.73.2","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"acme","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tacme\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t27.247.73.2\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"ACME (acme.acmecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"27.247.73.2","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"acme","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC3.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 63801 vendorcode: 6463504 action: Logon streamName: microsoft-windows-security-auditing clientIP: 27.247.73.2 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t5.146.221.98\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"5.146.221.98","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
{ "senderhost": "BODC3.backoffice.org", "severitylabel": "Info", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "productids": [ 6, 43, 0 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-06T06:02:55.885Z\",\"agent\":{\"ephemeral_id\":\"86131cfc-cb81-4812-8ebe-9b1c95d95688\",\"id\":\"88cf4cc3-0b4e-438f-acbe-8aeef37b8023\",\"name\":\"BODC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-06T06:02:57.586Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC3.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\twayne\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC3\\n\\tSource Network Address:\\t5.146.221.98\\n\\tSource Port:\\t\\t63801\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"BODC3.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC3.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"5.146.221.98\",\"IpPort\":\"63801\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"wayne\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":1756}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6463504,\"task\":\"Logon\"}}", "sensitivity": "normal", "messagetype": "auth_failure", "clientport": 63801, "vendorcode": "6463504", "action": "Logon", "streamName": "microsoft-windows-security-auditing", "clientIP": "5.146.221.98", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t5.146.221.98\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"5.146.221.98","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-06T06:02:55.885Z","agent":{"ephemeral_id":"86131cfc-cb81-4812-8ebe-9b1c95d95688","id":"88cf4cc3-0b4e-438f-acbe-8aeef37b8023","name":"BODC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-06T06:02:57.586Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC3.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\twayne\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tBODC3\n\tSource Network Address:\t5.146.221.98\n\tSource Port:\t\t63801\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC3.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC3.backoffice.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2309","IpAddress":"5.146.221.98","IpPort":"63801","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"wayne","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":712,"thread":{"id":1756}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6463504,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: BODC3.backoffice.org severitylabel: Info tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] productids: [6, 43, 0] sourceinfo: unknown sensitivity: normal messagetype: auth_failure clientport: 63801 vendorcode: 6463504 action: Logon streamName: microsoft-windows-security-auditing clientIP: 5.146.221.98 userName: bob
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"175.53.233.103","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=175.53.233.103 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=175.53.233.103 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"175.53.233.103\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=175.53.233.103 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=175.53.233.103 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "175.53.233.103" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"175.53.233.103","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=175.53.233.103 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=175.53.233.103 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"175.53.233.103","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=175.53.233.103 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=175.53.233.103 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 175.53.233.103
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"27.170.58.222","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=27.170.58.222 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=27.170.58.222 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"27.170.58.222\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=27.170.58.222 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=27.170.58.222 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "27.170.58.222" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"27.170.58.222","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=27.170.58.222 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=27.170.58.222 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"27.170.58.222","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=27.170.58.222 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=27.170.58.222 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 27.170.58.222
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"136.56.14.251","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=136.56.14.251 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=136.56.14.251 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"136.56.14.251\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=136.56.14.251 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=136.56.14.251 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "136.56.14.251" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"136.56.14.251","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=136.56.14.251 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=136.56.14.251 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"136.56.14.251","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=136.56.14.251 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=136.56.14.251 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 136.56.14.251
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"70.184.201.149","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=70.184.201.149 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=70.184.201.149 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"70.184.201.149\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=70.184.201.149 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=70.184.201.149 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "70.184.201.149" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"70.184.201.149","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=70.184.201.149 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=70.184.201.149 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message