input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"70.184.201.149","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=70.184.201.149 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=70.184.201.149 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: lpnlqymga@diabetopole.com
emailsendingserver: 171.94.194.243
emailsubject: 全体人员
filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>
filename: from: lpnlqymga@diabetopole.com subj: 全体人员
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-03T10:51:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 70.184.201.149 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"153.249.186.154","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "lpnlqymga@diabetopole.com",
"emailsendingserver": "171.94.194.243",
"emailsubject": "\u5168\u4f53\u4eba\u5458",
"filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>",
"filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"153.249.186.154\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-03T10:51:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "153.249.186.154"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"153.249.186.154","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"153.249.186.154","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: lpnlqymga@diabetopole.com
emailsendingserver: 171.94.194.243
emailsubject: 全体人员
filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>
filename: from: lpnlqymga@diabetopole.com subj: 全体人员
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-03T10:51:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 153.249.186.154 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"21.162.141.18","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "lpnlqymga@diabetopole.com",
"emailsendingserver": "171.94.194.243",
"emailsubject": "\u5168\u4f53\u4eba\u5458",
"filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>",
"filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"21.162.141.18\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-03T10:51:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "21.162.141.18"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"21.162.141.18","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"21.162.141.18","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: lpnlqymga@diabetopole.com
emailsendingserver: 171.94.194.243
emailsubject: 全体人员
filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>
filename: from: lpnlqymga@diabetopole.com subj: 全体人员
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-03T10:51:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 21.162.141.18 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"123.3.72.204","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "lpnlqymga@diabetopole.com",
"emailsendingserver": "171.94.194.243",
"emailsubject": "\u5168\u4f53\u4eba\u5458",
"filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>",
"filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"123.3.72.204\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-03T10:51:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "123.3.72.204"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"123.3.72.204","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"123.3.72.204","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: lpnlqymga@diabetopole.com
emailsendingserver: 171.94.194.243
emailsubject: 全体人员
filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>
filename: from: lpnlqymga@diabetopole.com subj: 全体人员
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-03T10:51:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 123.3.72.204 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"249.40.236.209","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"emailfrom": "lpnlqymga@diabetopole.com",
"emailsendingserver": "171.94.194.243",
"emailsubject": "\u5168\u4f53\u4eba\u5458",
"filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>",
"filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"249.40.236.209\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-03T10:51:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "249.40.236.209"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"249.40.236.209","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"249.40.236.209","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: lpnlqymga@diabetopole.com
emailsendingserver: 171.94.194.243
emailsubject: 全体人员
filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>
filename: from: lpnlqymga@diabetopole.com subj: 全体人员
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-10-03T10:51:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 249.40.236.209 | Explain this syslog message |
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.1",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Jan 31 03:02:59",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0AE8B38207C9",
"clientmac": "0A53EFDDC06D",
"clientport": 59908,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "180.74.244.187",
"serverIP": "27.67.126.0"
} | Create a JSON artifact from the message |
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.1
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Jan 31 03:02:59
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0AE8B38207C9
clientmac: 0A53EFDDC06D
clientport: 59908
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 180.74.244.187
serverIP: 27.67.126.0 | Explain this syslog message |
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.1",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Jan 31 03:02:59",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0AE8B38207C9",
"clientmac": "0A53EFDDC06D",
"clientport": 59908,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "225.153.68.59",
"serverIP": "10.236.70.143"
} | Create a JSON artifact from the message |
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.1
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Jan 31 03:02:59
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0AE8B38207C9
clientmac: 0A53EFDDC06D
clientport: 59908
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 225.153.68.59
serverIP: 10.236.70.143 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t2.117.232.153\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.117.232.153","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50115,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t2.117.232.153\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"2.117.232.153\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "82403241",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "2.117.232.153",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t2.117.232.153\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.117.232.153","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t2.117.232.153\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.117.232.153","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50115
messagetype: auth_failure
productids: [6]
senderhost: UWDC2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 82403241
streamName: microsoft-windows-security-auditing
clientIP: 2.117.232.153
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t208.24.117.190\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.24.117.190","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50115,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t208.24.117.190\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"208.24.117.190\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "82403241",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "208.24.117.190",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t208.24.117.190\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.24.117.190","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t208.24.117.190\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.24.117.190","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50115
messagetype: auth_failure
productids: [6]
senderhost: UWDC2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 82403241
streamName: microsoft-windows-security-auditing
clientIP: 208.24.117.190
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t57.182.187.177\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"57.182.187.177","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50115,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t57.182.187.177\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"57.182.187.177\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "82403241",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "57.182.187.177",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t57.182.187.177\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"57.182.187.177","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t57.182.187.177\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"57.182.187.177","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50115
messagetype: auth_failure
productids: [6]
senderhost: UWDC2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 82403241
streamName: microsoft-windows-security-auditing
clientIP: 57.182.187.177
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t231.209.235.26\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.209.235.26","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50115,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t231.209.235.26\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"231.209.235.26\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC2.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "82403241",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "231.209.235.26",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t231.209.235.26\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.209.235.26","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t231.209.235.26\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.209.235.26","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50115
messagetype: auth_failure
productids: [6]
senderhost: UWDC2.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 82403241
streamName: microsoft-windows-security-auditing
clientIP: 231.209.235.26
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t142.2.131.106\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.2.131.106","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57118,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t142.2.131.106\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"NORDC-DC-04.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"142.2.131.106\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789560",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "142.2.131.106",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t142.2.131.106\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.2.131.106","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t142.2.131.106\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.2.131.106","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57118
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789560
streamName: microsoft-windows-security-auditing
clientIP: 142.2.131.106
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t212.227.146.77\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"212.227.146.77","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57118,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t212.227.146.77\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"212.227.146.77\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789560",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "212.227.146.77",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t212.227.146.77\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"212.227.146.77","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t212.227.146.77\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"212.227.146.77","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57118
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789560
streamName: microsoft-windows-security-auditing
clientIP: 212.227.146.77
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t85.48.195.10\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.48.195.10","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57118,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t85.48.195.10\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DC-04.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"85.48.195.10\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789560",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "85.48.195.10",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t85.48.195.10\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.48.195.10","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t85.48.195.10\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.48.195.10","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57118
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789560
streamName: microsoft-windows-security-auditing
clientIP: 85.48.195.10
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t118.220.87.58\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"118.220.87.58","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57118,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t118.220.87.58\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"118.220.87.58\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789560",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "118.220.87.58",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t118.220.87.58\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"118.220.87.58","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t118.220.87.58\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"118.220.87.58","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57118
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789560
streamName: microsoft-windows-security-auditing
clientIP: 118.220.87.58
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t46.32.97.248\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.32.97.248","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57107,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t46.32.97.248\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"46.32.97.248\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789225",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "46.32.97.248",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t46.32.97.248\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.32.97.248","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t46.32.97.248\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.32.97.248","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57107
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789225
streamName: microsoft-windows-security-auditing
clientIP: 46.32.97.248
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t202.249.12.194\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"202.249.12.194","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57107,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t202.249.12.194\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"202.249.12.194\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789225",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "202.249.12.194",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t202.249.12.194\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"202.249.12.194","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t202.249.12.194\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"202.249.12.194","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57107
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789225
streamName: microsoft-windows-security-auditing
clientIP: 202.249.12.194
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t220.138.79.33\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"220.138.79.33","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57107,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t220.138.79.33\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"220.138.79.33\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789225",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "220.138.79.33",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t220.138.79.33\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"220.138.79.33","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t220.138.79.33\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"220.138.79.33","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57107
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789225
streamName: microsoft-windows-security-auditing
clientIP: 220.138.79.33
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t129.66.85.14\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.66.85.14","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | {
"action": "Logon",
"clientport": 57107,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t129.66.85.14\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"129.66.85.14\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458789225",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "129.66.85.14",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t129.66.85.14\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.66.85.14","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t129.66.85.14\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.66.85.14","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 57107
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458789225
streamName: microsoft-windows-security-auditing
clientIP: 129.66.85.14
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t40.253.234.13\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"40.253.234.13","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63637,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t40.253.234.13\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"40.253.234.13\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458936198",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "40.253.234.13",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t40.253.234.13\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"40.253.234.13","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t40.253.234.13\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"40.253.234.13","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63637
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458936198
streamName: microsoft-windows-security-auditing
clientIP: 40.253.234.13
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t95.20.231.163\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.20.231.163","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63637,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t95.20.231.163\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DC-04.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"95.20.231.163\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458936198",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "95.20.231.163",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t95.20.231.163\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.20.231.163","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t95.20.231.163\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.20.231.163","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63637
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458936198
streamName: microsoft-windows-security-auditing
clientIP: 95.20.231.163
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t173.229.181.110\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.229.181.110","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63637,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t173.229.181.110\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-DC-04.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"173.229.181.110\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458936198",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "173.229.181.110",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t173.229.181.110\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.229.181.110","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t173.229.181.110\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.229.181.110","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63637
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458936198
streamName: microsoft-windows-security-auditing
clientIP: 173.229.181.110
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t244.147.143.9\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.147.143.9","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63637,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t244.147.143.9\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"NORDC-DC-04.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"244.147.143.9\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "458936198",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "244.147.143.9",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t244.147.143.9\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.147.143.9","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t244.147.143.9\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.147.143.9","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63637
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 458936198
streamName: microsoft-windows-security-auditing
clientIP: 244.147.143.9
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=153.97.209.233 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"153.97.209.233","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@umbrellautilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"153.97.209.233","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1676945955",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "45.25.43.139",
"sensitivity": "normal",
"application": "LastPass",
"messagetype": "credential_access",
"clienthostname": "478-256-0857",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=153.97.209.233 ::: message={\"access_device\":{\"epkey\":null,\"hostname\":null,\"ip\":\"153.97.209.233\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"charlie@umbrellautilities.com\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"153.97.209.233\",\"key\":\"DPHK1B3JQG13O4P4X0HL\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"478-256-0857\"},\"email\":\"charlie@umbrellautilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-21T02:19:15.383602+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676945955,\"txid\":\"5fe0abaa-8f0d-4dac-987a-51a02c7ee280\",\"user\":{\"groups\":[],\"key\":\"DUT0KKQOH0R1FTLFGDXI\",\"name\":\"charlie\"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "153.97.209.233",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=153.97.209.233 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"153.97.209.233","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@umbrellautilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"153.97.209.233","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=153.97.209.233 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"153.97.209.233","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@umbrellautilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"153.97.209.233","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 1676945955
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 45.25.43.139
sensitivity: normal
application: LastPass
messagetype: credential_access
clienthostname: 478-256-0857
streamName: DUO
clientIP: 153.97.209.233
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=156.208.114.182 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"156.208.114.182","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@wayneutilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"156.208.114.182","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@wayneutilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1676945955",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "45.25.43.139",
"sensitivity": "normal",
"application": "LastPass",
"messagetype": "credential_access",
"clienthostname": "478-256-0857",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=156.208.114.182 ::: message={\"access_device\":{\"epkey\":null,\"hostname\":null,\"ip\":\"156.208.114.182\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"charlie@wayneutilities.com\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"156.208.114.182\",\"key\":\"DPHK1B3JQG13O4P4X0HL\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"478-256-0857\"},\"email\":\"charlie@wayneutilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-21T02:19:15.383602+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676945955,\"txid\":\"5fe0abaa-8f0d-4dac-987a-51a02c7ee280\",\"user\":{\"groups\":[],\"key\":\"DUT0KKQOH0R1FTLFGDXI\",\"name\":\"charlie\"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "156.208.114.182",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=156.208.114.182 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"156.208.114.182","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@wayneutilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"156.208.114.182","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@wayneutilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=156.208.114.182 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"156.208.114.182","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@wayneutilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"156.208.114.182","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@wayneutilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 1676945955
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 45.25.43.139
sensitivity: normal
application: LastPass
messagetype: credential_access
clienthostname: 478-256-0857
streamName: DUO
clientIP: 156.208.114.182
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"johndoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@oscorputilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"54.8.173.140","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | {
"clienthostname": "EMARTIN_LT",
"clientmac": "00-ff-16-b6-91-c6",
"filehash": "68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27",
"filename": "msedge.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe",
"message": "WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3\",\"confidence\":100,\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"msedge.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --profile-directory=Default\",\"parent_md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043\",\"parent_sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2023-11-14T16:13:29Z\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"user_name\":\"johndoe\"}],\"behaviors_processed\":[\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2023-11-14T16:13:37.337045693Z\",\"date_updated\":\"2023-11-14T16:13:42Z\",\"detection_id\":\"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2023-11-13T19:06:32.562Z\",\"agent_version\":\"7.04.17605.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.5.1\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"17605\",\"config_id_platform\":\"3\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"external_ip\":\"24.125.141.188\",\"first_seen\":\"2023-03-10T14:31:51Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"EMARTIN_LT\",\"last_login_timestamp\":\"2023-11-14T11:56:51Z\",\"last_login_user\":\"emartin@oscorputilities.com\",\"last_seen\":\"2023-11-14T16:05:35Z\",\"local_ip\":\"54.8.173.140\",\"mac_address\":\"00-ff-16-b6-91-c6\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2023-11-14T16:06:34Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5501\"},\"email_sent\":false,\"first_behavior\":\"2023-11-14T16:13:29Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2023-11-14T16:13:29Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"sha256\":\"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe ::: messageType=endpoint_protection_event",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "54.8.173.140",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"johndoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@oscorputilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"54.8.173.140","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"johndoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@oscorputilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"54.8.173.140","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: EMARTIN_LT
clientmac: 00-ff-16-b6-91-c6
filehash: 68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27
filename: msedge.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 54.8.173.140
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"janedoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"150.188.30.22","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | {
"clienthostname": "EMARTIN_LT",
"clientmac": "00-ff-16-b6-91-c6",
"filehash": "68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27",
"filename": "msedge.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe",
"message": "WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3\",\"confidence\":100,\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"msedge.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --profile-directory=Default\",\"parent_md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043\",\"parent_sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2023-11-14T16:13:29Z\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2023-11-14T16:13:37.337045693Z\",\"date_updated\":\"2023-11-14T16:13:42Z\",\"detection_id\":\"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2023-11-13T19:06:32.562Z\",\"agent_version\":\"7.04.17605.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.5.1\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"17605\",\"config_id_platform\":\"3\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"external_ip\":\"24.125.141.188\",\"first_seen\":\"2023-03-10T14:31:51Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"EMARTIN_LT\",\"last_login_timestamp\":\"2023-11-14T11:56:51Z\",\"last_login_user\":\"emartin@starkutilities.com\",\"last_seen\":\"2023-11-14T16:05:35Z\",\"local_ip\":\"150.188.30.22\",\"mac_address\":\"00-ff-16-b6-91-c6\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2023-11-14T16:06:34Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5501\"},\"email_sent\":false,\"first_behavior\":\"2023-11-14T16:13:29Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2023-11-14T16:13:29Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"sha256\":\"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe ::: messageType=endpoint_protection_event",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "150.188.30.22",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"janedoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"150.188.30.22","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"janedoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"150.188.30.22","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: EMARTIN_LT
clientmac: 00-ff-16-b6-91-c6
filehash: 68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27
filename: msedge.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 150.188.30.22
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"bob"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"121.125.83.169","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | {
"clienthostname": "EMARTIN_LT",
"clientmac": "00-ff-16-b6-91-c6",
"filehash": "68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27",
"filename": "msedge.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe",
"message": "WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3\",\"confidence\":100,\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"msedge.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --profile-directory=Default\",\"parent_md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043\",\"parent_sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2023-11-14T16:13:29Z\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"user_name\":\"bob\"}],\"behaviors_processed\":[\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2023-11-14T16:13:37.337045693Z\",\"date_updated\":\"2023-11-14T16:13:42Z\",\"detection_id\":\"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2023-11-13T19:06:32.562Z\",\"agent_version\":\"7.04.17605.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.5.1\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"17605\",\"config_id_platform\":\"3\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"external_ip\":\"24.125.141.188\",\"first_seen\":\"2023-03-10T14:31:51Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"EMARTIN_LT\",\"last_login_timestamp\":\"2023-11-14T11:56:51Z\",\"last_login_user\":\"emartin@starkutilities.com\",\"last_seen\":\"2023-11-14T16:05:35Z\",\"local_ip\":\"121.125.83.169\",\"mac_address\":\"00-ff-16-b6-91-c6\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2023-11-14T16:06:34Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5501\"},\"email_sent\":false,\"first_behavior\":\"2023-11-14T16:13:29Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2023-11-14T16:13:29Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"sha256\":\"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe ::: messageType=endpoint_protection_event",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "121.125.83.169",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"bob"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"121.125.83.169","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"bob"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"121.125.83.169","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: EMARTIN_LT
clientmac: 00-ff-16-b6-91-c6
filehash: 68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27
filename: msedge.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 121.125.83.169
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"alice","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "EMARTIN_LT.undefined",
"clientmac": "50eb71a0761b",
"filehash": "2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c",
"filename": "PCAppStore.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"timestamp\":\"2023-12-12T12:38:26Z\",\"behavior_id\":\"5760\",\"filename\":\"PCAppStore.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\\\" /init default\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Adware/PUP\",\"technique_id\":\"CST0006\",\"display_name\":\"\",\"description\":\"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.\",\"severity\":30,\"confidence\":30,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915\",\"sha256\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"md5\":\"fce67108058f3b2b72e0aad583cd88bc\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730\"},\"pattern_disposition\":2304,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":true,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-12-12T12:38:26Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "150.68.224.183",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"alice","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"alice","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: EMARTIN_LT.undefined
clientmac: 50eb71a0761b
filehash: 2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c
filename: PCAppStore.exe
filepath: \Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-12-12T12:38:26Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 150.68.224.183
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"charlie","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "EMARTIN_LT.undefined",
"clientmac": "50eb71a0761b",
"filehash": "2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c",
"filename": "PCAppStore.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"timestamp\":\"2023-12-12T12:38:26Z\",\"behavior_id\":\"5760\",\"filename\":\"PCAppStore.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\\\" /init default\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Adware/PUP\",\"technique_id\":\"CST0006\",\"display_name\":\"\",\"description\":\"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.\",\"severity\":30,\"confidence\":30,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915\",\"sha256\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"md5\":\"fce67108058f3b2b72e0aad583cd88bc\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730\"},\"pattern_disposition\":2304,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":true,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-12-12T12:38:26Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "212.113.18.99",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"charlie","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"charlie","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: EMARTIN_LT.undefined
clientmac: 50eb71a0761b
filehash: 2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c
filename: PCAppStore.exe
filepath: \Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-12-12T12:38:26Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 212.113.18.99
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t64.45.88.28\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.45.88.28","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53440,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t64.45.88.28\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC1.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"64.45.88.28\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393912",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "64.45.88.28",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t64.45.88.28\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.45.88.28","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t64.45.88.28\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.45.88.28","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53440
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393912
streamName: microsoft-windows-security-auditing
clientIP: 64.45.88.28
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.74.188.184\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.74.188.184","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53440,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t223.74.188.184\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"223.74.188.184\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393912",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "223.74.188.184",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.74.188.184\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.74.188.184","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.74.188.184\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.74.188.184","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53440
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393912
streamName: microsoft-windows-security-auditing
clientIP: 223.74.188.184
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t104.226.250.108\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"104.226.250.108","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53441,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t104.226.250.108\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"104.226.250.108\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393913",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "104.226.250.108",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t104.226.250.108\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"104.226.250.108","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t104.226.250.108\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"104.226.250.108","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53441
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393913
streamName: microsoft-windows-security-auditing
clientIP: 104.226.250.108
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t34.69.99.70\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.69.99.70","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | {
"action": "Logon",
"clientport": 53441,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t34.69.99.70\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"34.69.99.70\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC1.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "105393913",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "34.69.99.70",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t34.69.99.70\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.69.99.70","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t34.69.99.70\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.69.99.70","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 53441
messagetype: auth_failure
productids: [6]
senderhost: UWDC1.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 105393913
streamName: microsoft-windows-security-auditing
clientIP: 34.69.99.70
userName: bob | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.