input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"70.184.201.149","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=70.184.201.149 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=70.184.201.149 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 70.184.201.149
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"153.249.186.154","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"153.249.186.154\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "153.249.186.154" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"153.249.186.154","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"153.249.186.154","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=153.249.186.154 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=153.249.186.154 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 153.249.186.154
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"21.162.141.18","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"21.162.141.18\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "21.162.141.18" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"21.162.141.18","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"21.162.141.18","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=21.162.141.18 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=21.162.141.18 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 21.162.141.18
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"123.3.72.204","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"123.3.72.204\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "123.3.72.204" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"123.3.72.204","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"123.3.72.204","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=123.3.72.204 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=123.3.72.204 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 123.3.72.204
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"249.40.236.209","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "lpnlqymga@diabetopole.com", "emailsendingserver": "171.94.194.243", "emailsubject": "\u5168\u4f53\u4eba\u5458", "filehash": "<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>", "filename": "from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3\",\"threatTime\":\"2023-09-28T19:47:53.000Z\",\"threat\":\"http://youxiangzhuan1.xyz\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-03T10:51:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"\u5168\u4f53\u4eba\u5458\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"dkimv\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2083,\"headerFrom\":\"\u674e\u8bd7\u6668 <lpnlqymga@diabetopole.com>\",\"headerReplyTo\":null,\"fromAddress\":[\"lpnlqymga@diabetopole.com\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"tsam@pbcapital.com\"],\"xmailer\":\"Jyjnuvaawh Yvlexxm 2.5\",\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab\",\"md5\":\"310a840c9492d607dda0c9b4af354208\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e\",\"QID\":\"3tefhrs4j4-1\",\"GUID\":\"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs\",\"sender\":\"lpnlqymga@diabetopole.com\",\"recipient\":[\"tsam@pbcapital.com\"],\"senderIP\":\"249.40.236.209\",\"messageID\":\"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>\"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: \u5168\u4f53\u4eba\u5458 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=\u5168\u4f53\u4eba\u5458 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-03T10:51:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "249.40.236.209" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"249.40.236.209","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9f304ff67cc36416bd3ddf113e452b373a6b471aa3de995154404ee651528ef3","threatTime":"2023-09-28T19:47:53.000Z","threat":"http://youxiangzhuan1.xyz","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-03T10:51:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"全体人员","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","dkimv","spf","spam","dmarc","pdr","urldefense"],"messageSize":2083,"headerFrom":"李诗晨 <lpnlqymga@diabetopole.com>","headerReplyTo":null,"fromAddress":["lpnlqymga@diabetopole.com"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["tsam@pbcapital.com"],"xmailer":"Jyjnuvaawh Yvlexxm 2.5","messageParts":[{"disposition":"inline","sha256":"699120de5dcfc0094b0aedec6aa5b099a8cf92c53b775c12241acd87eb6e48ab","md5":"310a840c9492d607dda0c9b4af354208","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c76c4ff4-6b4e-5f84-e296-1cd0acfcc11e","QID":"3tefhrs4j4-1","GUID":"xB5Pg0dqSt1StY3Fhr5_HuFPtWCcKdvs","sender":"lpnlqymga@diabetopole.com","recipient":["tsam@pbcapital.com"],"senderIP":"249.40.236.209","messageID":"<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com>"} ::: fileHash=<216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> ::: fileName=from: lpnlqymga@diabetopole.com subj: 全体人员 ::: serverIP=249.40.236.209 ::: emailFrom=lpnlqymga@diabetopole.com ::: created_at=2023-10-03T10:51:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=全体人员 ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-03T10:51:53.000Z ::: emailSendingServer=249.40.236.209 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: lpnlqymga@diabetopole.com emailsendingserver: 171.94.194.243 emailsubject: 全体人员 filehash: <216ac73e54669e9324c64cd4025fd9e0@diabetopole.com> filename: from: lpnlqymga@diabetopole.com subj: 全体人员 messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-03T10:51:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 249.40.236.209
Explain this syslog message
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.1", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "DPI Note:HTTPTraffic", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Jan 31 03:02:59", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0AE8B38207C9", "clientmac": "0A53EFDDC06D", "clientport": 59908, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "180.74.244.187", "serverIP": "27.67.126.0" }
Create a JSON artifact from the message
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=27.67.126.0 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=180.74.244.187 dst=27.67.126.0 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.1 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Jan 31 03:02:59 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0AE8B38207C9 clientmac: 0A53EFDDC06D clientport: 59908 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 180.74.244.187 serverIP: 27.67.126.0
Explain this syslog message
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.1", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "DPI Note:HTTPTraffic", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Jan 31 03:02:59", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0AE8B38207C9", "clientmac": "0A53EFDDC06D", "clientport": 59908, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "225.153.68.59", "serverIP": "10.236.70.143" }
Create a JSON artifact from the message
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Jan 31 03:02:59 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1719|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36068 cn1Label=Host ID dvc=10.236.70.143 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:E8:B3:82:07:C9 smac=0A:53:EF:DD:C0:6D TrendMicroDsFrameType=IP src=225.153.68.59 dst=10.236.70.143 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=59908 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=2 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.1 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Jan 31 03:02:59 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0AE8B38207C9 clientmac: 0A53EFDDC06D clientport: 59908 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 225.153.68.59 serverIP: 10.236.70.143
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t2.117.232.153\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.117.232.153","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
{ "action": "Logon", "clientport": 50115, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t2.117.232.153\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"2.117.232.153\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "82403241", "streamName": "microsoft-windows-security-auditing", "clientIP": "2.117.232.153", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t2.117.232.153\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.117.232.153","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t2.117.232.153\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"2.117.232.153","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50115 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 82403241 streamName: microsoft-windows-security-auditing clientIP: 2.117.232.153 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t208.24.117.190\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.24.117.190","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
{ "action": "Logon", "clientport": 50115, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t208.24.117.190\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC2.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"208.24.117.190\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "82403241", "streamName": "microsoft-windows-security-auditing", "clientIP": "208.24.117.190", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t208.24.117.190\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.24.117.190","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t208.24.117.190\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC2.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.24.117.190","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50115 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 82403241 streamName: microsoft-windows-security-auditing clientIP: 208.24.117.190 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t57.182.187.177\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"57.182.187.177","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
{ "action": "Logon", "clientport": 50115, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t57.182.187.177\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"57.182.187.177\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "82403241", "streamName": "microsoft-windows-security-auditing", "clientIP": "57.182.187.177", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t57.182.187.177\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"57.182.187.177","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t57.182.187.177\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"57.182.187.177","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50115 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 82403241 streamName: microsoft-windows-security-auditing clientIP: 57.182.187.177 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t231.209.235.26\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.209.235.26","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
{ "action": "Logon", "clientport": 50115, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-28T09:02:30.891Z\",\"agent\":{\"ephemeral_id\":\"e95f1c2e-0eb5-4104-b171-5f81ef691613\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-28T09:02:31.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t231.209.235.26\\n\\tSource Port:\\t\\t50115\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"231.209.235.26\",\"IpPort\":\"50115\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":5232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":82403241,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC2.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "82403241", "streamName": "microsoft-windows-security-auditing", "clientIP": "231.209.235.26", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t231.209.235.26\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.209.235.26","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-28T09:02:30.891Z","agent":{"ephemeral_id":"e95f1c2e-0eb5-4104-b171-5f81ef691613","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-28T09:02:31.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t231.209.235.26\n\tSource Port:\t\t50115\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.209.235.26","IpPort":"50115","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":5232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":82403241,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 50115 messagetype: auth_failure productids: [6] senderhost: UWDC2.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 82403241 streamName: microsoft-windows-security-auditing clientIP: 231.209.235.26 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t142.2.131.106\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.2.131.106","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
{ "action": "Logon", "clientport": 57118, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t142.2.131.106\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"NORDC-DC-04.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"142.2.131.106\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789560", "streamName": "microsoft-windows-security-auditing", "clientIP": "142.2.131.106", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t142.2.131.106\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.2.131.106","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t142.2.131.106\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"142.2.131.106","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57118 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789560 streamName: microsoft-windows-security-auditing clientIP: 142.2.131.106 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t212.227.146.77\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"212.227.146.77","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
{ "action": "Logon", "clientport": 57118, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t212.227.146.77\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"212.227.146.77\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789560", "streamName": "microsoft-windows-security-auditing", "clientIP": "212.227.146.77", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t212.227.146.77\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"212.227.146.77","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t212.227.146.77\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"212.227.146.77","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57118 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789560 streamName: microsoft-windows-security-auditing clientIP: 212.227.146.77 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t85.48.195.10\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.48.195.10","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
{ "action": "Logon", "clientport": 57118, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t85.48.195.10\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DC-04.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"85.48.195.10\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789560", "streamName": "microsoft-windows-security-auditing", "clientIP": "85.48.195.10", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t85.48.195.10\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.48.195.10","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t85.48.195.10\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"85.48.195.10","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57118 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789560 streamName: microsoft-windows-security-auditing clientIP: 85.48.195.10 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t118.220.87.58\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"118.220.87.58","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
{ "action": "Logon", "clientport": 57118, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:32.426Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:33.166Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t118.220.87.58\\n\\tSource Port:\\t\\t57118\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"118.220.87.58\",\"IpPort\":\"57118\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":12916}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789560,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789560", "streamName": "microsoft-windows-security-auditing", "clientIP": "118.220.87.58", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t118.220.87.58\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"118.220.87.58","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:32.426Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:33.166Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t118.220.87.58\n\tSource Port:\t\t57118\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"118.220.87.58","IpPort":"57118","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":12916}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789560,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57118 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789560 streamName: microsoft-windows-security-auditing clientIP: 118.220.87.58 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t46.32.97.248\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.32.97.248","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
{ "action": "Logon", "clientport": 57107, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t46.32.97.248\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"46.32.97.248\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789225", "streamName": "microsoft-windows-security-auditing", "clientIP": "46.32.97.248", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t46.32.97.248\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.32.97.248","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t46.32.97.248\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.32.97.248","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57107 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789225 streamName: microsoft-windows-security-auditing clientIP: 46.32.97.248 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t202.249.12.194\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"202.249.12.194","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
{ "action": "Logon", "clientport": 57107, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t202.249.12.194\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"202.249.12.194\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789225", "streamName": "microsoft-windows-security-auditing", "clientIP": "202.249.12.194", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t202.249.12.194\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"202.249.12.194","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t202.249.12.194\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"202.249.12.194","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57107 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789225 streamName: microsoft-windows-security-auditing clientIP: 202.249.12.194 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t220.138.79.33\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"220.138.79.33","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
{ "action": "Logon", "clientport": 57107, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t220.138.79.33\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"220.138.79.33\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789225", "streamName": "microsoft-windows-security-auditing", "clientIP": "220.138.79.33", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t220.138.79.33\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"220.138.79.33","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t220.138.79.33\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"220.138.79.33","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57107 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789225 streamName: microsoft-windows-security-auditing clientIP: 220.138.79.33 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t129.66.85.14\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.66.85.14","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
{ "action": "Logon", "clientport": 57107, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T15:26:16.825Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T15:26:18.711Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t129.66.85.14\\n\\tSource Port:\\t\\t57107\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"129.66.85.14\",\"IpPort\":\"57107\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":6240}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458789225,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458789225", "streamName": "microsoft-windows-security-auditing", "clientIP": "129.66.85.14", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t129.66.85.14\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.66.85.14","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T15:26:16.825Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T15:26:18.711Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t129.66.85.14\n\tSource Port:\t\t57107\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.66.85.14","IpPort":"57107","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":6240}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458789225,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 57107 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458789225 streamName: microsoft-windows-security-auditing clientIP: 129.66.85.14 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t40.253.234.13\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"40.253.234.13","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
{ "action": "Logon", "clientport": 63637, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t40.253.234.13\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"40.253.234.13\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458936198", "streamName": "microsoft-windows-security-auditing", "clientIP": "40.253.234.13", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t40.253.234.13\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"40.253.234.13","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t40.253.234.13\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"40.253.234.13","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63637 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458936198 streamName: microsoft-windows-security-auditing clientIP: 40.253.234.13 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t95.20.231.163\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.20.231.163","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
{ "action": "Logon", "clientport": 63637, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t95.20.231.163\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DC-04.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"95.20.231.163\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458936198", "streamName": "microsoft-windows-security-auditing", "clientIP": "95.20.231.163", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t95.20.231.163\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.20.231.163","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t95.20.231.163\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.20.231.163","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63637 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458936198 streamName: microsoft-windows-security-auditing clientIP: 95.20.231.163 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t173.229.181.110\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.229.181.110","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
{ "action": "Logon", "clientport": 63637, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t173.229.181.110\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-DC-04.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"173.229.181.110\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458936198", "streamName": "microsoft-windows-security-auditing", "clientIP": "173.229.181.110", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t173.229.181.110\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.229.181.110","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t173.229.181.110\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"173.229.181.110","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63637 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458936198 streamName: microsoft-windows-security-auditing clientIP: 173.229.181.110 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t244.147.143.9\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.147.143.9","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
{ "action": "Logon", "clientport": 63637, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-08T16:30:33.135Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-08T16:30:33.414Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t244.147.143.9\\n\\tSource Port:\\t\\t63637\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"NORDC-DC-04.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"244.147.143.9\",\"IpPort\":\"63637\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":9228}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":458936198,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "458936198", "streamName": "microsoft-windows-security-auditing", "clientIP": "244.147.143.9", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t244.147.143.9\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.147.143.9","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-08T16:30:33.135Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-08T16:30:33.414Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t244.147.143.9\n\tSource Port:\t\t63637\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"244.147.143.9","IpPort":"63637","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":9228}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":458936198,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 63637 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 458936198 streamName: microsoft-windows-security-auditing clientIP: 244.147.143.9 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=153.97.209.233 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"153.97.209.233","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@umbrellautilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"153.97.209.233","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1676945955", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "45.25.43.139", "sensitivity": "normal", "application": "LastPass", "messagetype": "credential_access", "clienthostname": "478-256-0857", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=153.97.209.233 ::: message={\"access_device\":{\"epkey\":null,\"hostname\":null,\"ip\":\"153.97.209.233\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"charlie@umbrellautilities.com\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"153.97.209.233\",\"key\":\"DPHK1B3JQG13O4P4X0HL\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"478-256-0857\"},\"email\":\"charlie@umbrellautilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-21T02:19:15.383602+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676945955,\"txid\":\"5fe0abaa-8f0d-4dac-987a-51a02c7ee280\",\"user\":{\"groups\":[],\"key\":\"DUT0KKQOH0R1FTLFGDXI\",\"name\":\"charlie\"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "153.97.209.233", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=153.97.209.233 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"153.97.209.233","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@umbrellautilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"153.97.209.233","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=153.97.209.233 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"153.97.209.233","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@umbrellautilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"153.97.209.233","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@umbrellautilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=153.97.209.233 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 1676945955 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 45.25.43.139 sensitivity: normal application: LastPass messagetype: credential_access clienthostname: 478-256-0857 streamName: DUO clientIP: 153.97.209.233 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=156.208.114.182 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"156.208.114.182","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@wayneutilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"156.208.114.182","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@wayneutilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1676945955", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "45.25.43.139", "sensitivity": "normal", "application": "LastPass", "messagetype": "credential_access", "clienthostname": "478-256-0857", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=156.208.114.182 ::: message={\"access_device\":{\"epkey\":null,\"hostname\":null,\"ip\":\"156.208.114.182\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"charlie@wayneutilities.com\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"156.208.114.182\",\"key\":\"DPHK1B3JQG13O4P4X0HL\",\"location\":{\"city\":\"Flowery Branch\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"478-256-0857\"},\"email\":\"charlie@wayneutilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-21T02:19:15.383602+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676945955,\"txid\":\"5fe0abaa-8f0d-4dac-987a-51a02c7ee280\",\"user\":{\"groups\":[],\"key\":\"DUT0KKQOH0R1FTLFGDXI\",\"name\":\"charlie\"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "156.208.114.182", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=156.208.114.182 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"156.208.114.182","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@wayneutilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"156.208.114.182","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@wayneutilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=156.208.114.182 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"156.208.114.182","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"}},"alias":"charlie@wayneutilities.com","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"156.208.114.182","key":"DPHK1B3JQG13O4P4X0HL","location":{"city":"Flowery Branch","country":"United States","state":"Georgia"},"name":"478-256-0857"},"email":"charlie@wayneutilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-21T02:19:15.383602+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676945955,"txid":"5fe0abaa-8f0d-4dac-987a-51a02c7ee280","user":{"groups":[],"key":"DUT0KKQOH0R1FTLFGDXI","name":"charlie"}} ::: clientIP=156.208.114.182 ::: userName=charlie ::: created_at=1676945955 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676945955 ::: clientHostname=478-256-0857 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 1676945955 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 45.25.43.139 sensitivity: normal application: LastPass messagetype: credential_access clienthostname: 478-256-0857 streamName: DUO clientIP: 156.208.114.182 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"johndoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@oscorputilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"54.8.173.140","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
{ "clienthostname": "EMARTIN_LT", "clientmac": "00-ff-16-b6-91-c6", "filehash": "68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27", "filename": "msedge.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe", "message": "WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3\",\"confidence\":100,\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"msedge.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --profile-directory=Default\",\"parent_md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043\",\"parent_sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2023-11-14T16:13:29Z\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"user_name\":\"johndoe\"}],\"behaviors_processed\":[\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2023-11-14T16:13:37.337045693Z\",\"date_updated\":\"2023-11-14T16:13:42Z\",\"detection_id\":\"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2023-11-13T19:06:32.562Z\",\"agent_version\":\"7.04.17605.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.5.1\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"17605\",\"config_id_platform\":\"3\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"external_ip\":\"24.125.141.188\",\"first_seen\":\"2023-03-10T14:31:51Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"EMARTIN_LT\",\"last_login_timestamp\":\"2023-11-14T11:56:51Z\",\"last_login_user\":\"emartin@oscorputilities.com\",\"last_seen\":\"2023-11-14T16:05:35Z\",\"local_ip\":\"54.8.173.140\",\"mac_address\":\"00-ff-16-b6-91-c6\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2023-11-14T16:06:34Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5501\"},\"email_sent\":false,\"first_behavior\":\"2023-11-14T16:13:29Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2023-11-14T16:13:29Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"sha256\":\"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe ::: messageType=endpoint_protection_event", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "54.8.173.140", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"johndoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@oscorputilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"54.8.173.140","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=johndoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"johndoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@oscorputilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"54.8.173.140","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=54.8.173.140 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: EMARTIN_LT clientmac: 00-ff-16-b6-91-c6 filehash: 68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 filename: msedge.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 54.8.173.140 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"janedoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"150.188.30.22","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
{ "clienthostname": "EMARTIN_LT", "clientmac": "00-ff-16-b6-91-c6", "filehash": "68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27", "filename": "msedge.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe", "message": "WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3\",\"confidence\":100,\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"msedge.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --profile-directory=Default\",\"parent_md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043\",\"parent_sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2023-11-14T16:13:29Z\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2023-11-14T16:13:37.337045693Z\",\"date_updated\":\"2023-11-14T16:13:42Z\",\"detection_id\":\"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2023-11-13T19:06:32.562Z\",\"agent_version\":\"7.04.17605.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.5.1\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"17605\",\"config_id_platform\":\"3\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"external_ip\":\"24.125.141.188\",\"first_seen\":\"2023-03-10T14:31:51Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"EMARTIN_LT\",\"last_login_timestamp\":\"2023-11-14T11:56:51Z\",\"last_login_user\":\"emartin@starkutilities.com\",\"last_seen\":\"2023-11-14T16:05:35Z\",\"local_ip\":\"150.188.30.22\",\"mac_address\":\"00-ff-16-b6-91-c6\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2023-11-14T16:06:34Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5501\"},\"email_sent\":false,\"first_behavior\":\"2023-11-14T16:13:29Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2023-11-14T16:13:29Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"sha256\":\"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe ::: messageType=endpoint_protection_event", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "150.188.30.22", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"janedoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"150.188.30.22","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"janedoe"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"150.188.30.22","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=150.188.30.22 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: EMARTIN_LT clientmac: 00-ff-16-b6-91-c6 filehash: 68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 filename: msedge.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 150.188.30.22 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"bob"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"121.125.83.169","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
{ "clienthostname": "EMARTIN_LT", "clientmac": "00-ff-16-b6-91-c6", "filehash": "68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27", "filename": "msedge.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe", "message": "WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3\",\"confidence\":100,\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"msedge.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\Microsoft\\\\Edge\\\\Application\\\\msedge.exe\\\" --profile-directory=Default\",\"parent_md5\":\"d5174a0327dd4ad65f24959049c7113d\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043\",\"parent_sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2023-11-14T16:13:29Z\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"user_name\":\"bob\"}],\"behaviors_processed\":[\"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2023-11-14T16:13:37.337045693Z\",\"date_updated\":\"2023-11-14T16:13:42Z\",\"detection_id\":\"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2023-11-13T19:06:32.562Z\",\"agent_version\":\"7.04.17605.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.5.1\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"17605\",\"config_id_platform\":\"3\",\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"external_ip\":\"24.125.141.188\",\"first_seen\":\"2023-03-10T14:31:51Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"EMARTIN_LT\",\"last_login_timestamp\":\"2023-11-14T11:56:51Z\",\"last_login_user\":\"emartin@starkutilities.com\",\"last_seen\":\"2023-11-14T16:05:35Z\",\"local_ip\":\"121.125.83.169\",\"mac_address\":\"00-ff-16-b6-91-c6\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2023-11-14T16:06:34Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5501\"},\"email_sent\":false,\"first_behavior\":\"2023-11-14T16:13:29Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2023-11-14T16:13:29Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"sha256\":\"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe ::: messageType=endpoint_protection_event", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "121.125.83.169", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"bob"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"121.125.83.169","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: streamName=Crowdstrike Detection ::: clientHostname=EMARTIN_LT ::: clientMAC=00-ff-16-b6-91-c6 ::: fileHash=68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 ::: userName=bob ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2052,i,11849213268837189055,16613787588176336786,262144 /prefetch:3","confidence":100,"control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:227635083624","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"8a9af11f840642dd9fdf120a51bd3551","display_name":"Detect OnWrite Adware/PUP Hash","filename":"msedge.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d5174a0327dd4ad65f24959049c7113d","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --profile-directory=Default","parent_md5":"d5174a0327dd4ad65f24959049c7113d","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877714451043","parent_sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2023-11-14T16:13:29Z","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","user_name":"bob"}],"behaviors_processed":["pid:8a9af11f840642dd9fdf120a51bd3551:1877720048920:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2023-11-14T16:13:37.337045693Z","date_updated":"2023-11-14T16:13:42Z","detection_id":"ldt:8a9af11f840642dd9fdf120a51bd3551:227635083624","device":{"agent_load_flags":"0","agent_local_time":"2023-11-13T19:06:32.562Z","agent_version":"7.04.17605.0","bios_manufacturer":"Dell Inc.","bios_version":"1.5.1","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"17605","config_id_platform":"3","device_id":"8a9af11f840642dd9fdf120a51bd3551","external_ip":"24.125.141.188","first_seen":"2023-03-10T14:31:51Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"EMARTIN_LT","last_login_timestamp":"2023-11-14T11:56:51Z","last_login_user":"emartin@starkutilities.com","last_seen":"2023-11-14T16:05:35Z","local_ip":"121.125.83.169","mac_address":"00-ff-16-b6-91-c6","major_version":"10","minor_version":"0","modified_timestamp":"2023-11-14T16:06:34Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5501"},"email_sent":false,"first_behavior":"2023-11-14T16:13:29Z","hostinfo":{"domain":""},"last_behavior":"2023-11-14T16:13:29Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"8a9af11f840642dd9fdf120a51bd3551_204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","sha256":"204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: fileName=msedge.exe ::: clientIP=121.125.83.169 ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ::: messageType=endpoint_protection_event
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: EMARTIN_LT clientmac: 00-ff-16-b6-91-c6 filehash: 68455b27eddb80b636127783478f0014aeb80abe98d788c37f18b342ae15be27 filename: msedge.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\msedge.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 121.125.83.169 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"alice","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "EMARTIN_LT.undefined", "clientmac": "50eb71a0761b", "filehash": "2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c", "filename": "PCAppStore.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"timestamp\":\"2023-12-12T12:38:26Z\",\"behavior_id\":\"5760\",\"filename\":\"PCAppStore.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\\\" /init default\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Adware/PUP\",\"technique_id\":\"CST0006\",\"display_name\":\"\",\"description\":\"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.\",\"severity\":30,\"confidence\":30,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915\",\"sha256\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"md5\":\"fce67108058f3b2b72e0aad583cd88bc\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730\"},\"pattern_disposition\":2304,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":true,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-12-12T12:38:26Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "150.68.224.183", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"alice","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"alice","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=150.68.224.183 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=alice ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: EMARTIN_LT.undefined clientmac: 50eb71a0761b filehash: 2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c filename: PCAppStore.exe filepath: \Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-12-12T12:38:26Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 150.68.224.183 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"charlie","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "EMARTIN_LT.undefined", "clientmac": "50eb71a0761b", "filehash": "2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c", "filename": "PCAppStore.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"8a9af11f840642dd9fdf120a51bd3551\",\"timestamp\":\"2023-12-12T12:38:26Z\",\"behavior_id\":\"5760\",\"filename\":\"PCAppStore.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\\\" /init default\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Adware/PUP\",\"technique_id\":\"CST0006\",\"display_name\":\"\",\"description\":\"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.\",\"severity\":30,\"confidence\":30,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\emartin\\\\PCAppStore\\\\PCAppStore.exe\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-3524866106-1250543537-2299143350-2362608680\",\"control_graph_id\":\"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293\",\"triggering_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915\",\"sha256\":\"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c\",\"md5\":\"fce67108058f3b2b72e0aad583cd88bc\",\"parent_details\":{\"parent_sha256\":\"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3\",\"parent_md5\":\"d45bd7c7b7bf977246e9409d63435231\",\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730\"},\"pattern_disposition\":2304,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":true,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-12-12T12:38:26Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "212.113.18.99", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"charlie","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"8a9af11f840642dd9fdf120a51bd3551","timestamp":"2023-12-12T12:38:26Z","behavior_id":"5760","filename":"PCAppStore.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\emartin\\PCAppStore\\PCAppStore.exe\" /init default","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Adware/PUP","technique_id":"CST0006","display_name":"","description":"This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.","severity":30,"confidence":30,"ioc_type":"hash_sha256","ioc_value":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume3\\Users\\emartin\\PCAppStore\\PCAppStore.exe","user_name":"charlie","user_id":"S-1-12-1-3524866106-1250543537-2299143350-2362608680","control_graph_id":"ctg:8a9af11f840642dd9fdf120a51bd3551:240518693293","triggering_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079140020915","sha256":"2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c","md5":"fce67108058f3b2b72e0aad583cd88bc","parent_details":{"parent_sha256":"249cb3cb46fd875196e7ed4a8736271a64ff2d8132357222a283be53e7232ed3","parent_md5":"d45bd7c7b7bf977246e9409d63435231","parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_process_graph_id":"pid:8a9af11f840642dd9fdf120a51bd3551:2079035872730"},"pattern_disposition":2304,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":true,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.113.18.99 ::: fileHash=2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c ::: fileName=PCAppStore.exe ::: filePath=\Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe ::: userName=charlie ::: clientMAC=50eb71a0761b ::: created_at=2023-12-12T12:38:26Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-12-12T12:38:26Z ::: clientHostname=EMARTIN_LT.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: EMARTIN_LT.undefined clientmac: 50eb71a0761b filehash: 2cd3b38357b43147bec39a55eb686c6611786d68850d85916898cfded8892f9c filename: PCAppStore.exe filepath: \Device\HarddiskVolume3\Users\emartin\PCAppStore\PCAppStore.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-12-12T12:38:26Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 212.113.18.99 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t64.45.88.28\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.45.88.28","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
{ "action": "Logon", "clientport": 53440, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t64.45.88.28\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC1.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"64.45.88.28\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393912", "streamName": "microsoft-windows-security-auditing", "clientIP": "64.45.88.28", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t64.45.88.28\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.45.88.28","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t64.45.88.28\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC1.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.45.88.28","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53440 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393912 streamName: microsoft-windows-security-auditing clientIP: 64.45.88.28 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.74.188.184\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.74.188.184","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
{ "action": "Logon", "clientport": 53440, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.514Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t223.74.188.184\\n\\tSource Port:\\t\\t53440\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"223.74.188.184\",\"IpPort\":\"53440\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393912,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393912", "streamName": "microsoft-windows-security-auditing", "clientIP": "223.74.188.184", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.74.188.184\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.74.188.184","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.514Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t223.74.188.184\n\tSource Port:\t\t53440\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"223.74.188.184","IpPort":"53440","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393912,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53440 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393912 streamName: microsoft-windows-security-auditing clientIP: 223.74.188.184 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t104.226.250.108\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"104.226.250.108","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
{ "action": "Logon", "clientport": 53441, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t104.226.250.108\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"104.226.250.108\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393913", "streamName": "microsoft-windows-security-auditing", "clientIP": "104.226.250.108", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t104.226.250.108\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"104.226.250.108","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t104.226.250.108\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"104.226.250.108","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53441 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393913 streamName: microsoft-windows-security-auditing clientIP: 104.226.250.108 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t34.69.99.70\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.69.99.70","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
{ "action": "Logon", "clientport": 53441, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T17:18:19.519Z\",\"agent\":{\"ephemeral_id\":\"70656d30-22d9-4b17-adea-f60923a7c1f9\",\"id\":\"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d\",\"name\":\"UWDC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T17:18:21.422Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC1.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMEDIA-VULCAN\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-VULCAN\\n\\tSource Network Address:\\t34.69.99.70\\n\\tSource Port:\\t\\t53441\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC1.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC1.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"34.69.99.70\",\"IpPort\":\"53441\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MEDIA-VULCAN\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-VULCAN\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":2500}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":105393913,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC1.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "105393913", "streamName": "microsoft-windows-security-auditing", "clientIP": "34.69.99.70", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t34.69.99.70\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.69.99.70","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T17:18:19.519Z","agent":{"ephemeral_id":"70656d30-22d9-4b17-adea-f60923a7c1f9","id":"ee11d6f9-09cd-4b9b-a46b-f3fd5139fd0d","name":"UWDC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T17:18:21.422Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC1.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMEDIA-VULCAN\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-VULCAN\n\tSource Network Address:\t34.69.99.70\n\tSource Port:\t\t53441\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC1.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC1.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.69.99.70","IpPort":"53441","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MEDIA-VULCAN","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-VULCAN"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":2500}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":105393913,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 53441 messagetype: auth_failure productids: [6] senderhost: UWDC1.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 105393913 streamName: microsoft-windows-security-auditing clientIP: 34.69.99.70 userName: bob
Explain this syslog message