input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<132>Dec 3 02:51:14 ip-10-1-16-76 drupal: https://shareholders.stark.com|1701571874|access denied|206.100.125.57|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Dec 3 02:51:14 ip-10-1-16-76 drupal: https://shareholders.stark.com|1701571874|access denied|206.100.125.57|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Dec 3 02:51:14 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1701571874 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 206.100.125.57
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"238.154.103.81","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"charlie"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1677515757", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"110.0.5481.104\",\"epkey\":\"EPFEAQTY37XH27QWJVTG\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"238.154.103.81\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pensacola\",\"country\":\"United States\",\"state\":\"Florida\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIKQVT8SKWPB8J2K3BBQ\",\"name\":\"POS - Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-27T16:35:57.063611+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1677515757,\"txid\":\"de2149f9-7564-45e4-ab70-df3e669751a2\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUIQLYUMQU2BQSFFL1RO\",\"name\":\"charlie\"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "application": "POS - Production", "messagetype": "credential_access", "streamName": "DUO", "clientIP": "238.154.103.81", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"238.154.103.81","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"charlie"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"238.154.103.81","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"charlie"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1677515757 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: POS - Production messagetype: credential_access streamName: DUO clientIP: 238.154.103.81 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"57.230.78.169","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@umbrella.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"janedoe"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1677515757", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"110.0.5481.104\",\"epkey\":\"EPFEAQTY37XH27QWJVTG\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"57.230.78.169\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pensacola\",\"country\":\"United States\",\"state\":\"Florida\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIKQVT8SKWPB8J2K3BBQ\",\"name\":\"POS - Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"janedoe@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-27T16:35:57.063611+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1677515757,\"txid\":\"de2149f9-7564-45e4-ab70-df3e669751a2\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUIQLYUMQU2BQSFFL1RO\",\"name\":\"janedoe\"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "application": "POS - Production", "messagetype": "credential_access", "streamName": "DUO", "clientIP": "57.230.78.169", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"57.230.78.169","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@umbrella.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"janedoe"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"57.230.78.169","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@umbrella.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"janedoe"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1677515757 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: POS - Production messagetype: credential_access streamName: DUO clientIP: 57.230.78.169 userName: janedoe
Explain this syslog message
<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 10 17:07:35", "message": "<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699636055", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "184.189.86.206" }
Create a JSON artifact from the message
<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 10 17:07:35 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699636055 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 184.189.86.206
Explain this syslog message
<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Jan 1 19:07:16", "message": "<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1704136036", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "16.65.81.182" }
Create a JSON artifact from the message
<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Jan 1 19:07:16 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1704136036 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 16.65.81.182
Explain this syslog message
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "DPI Note:HTTPTraffic", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Stream Position :20", "trend micro_deep security agent", "DPI Flags:8" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags", "localstarttime": "Oct 1 08:15:18", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0E94916CB4FB", "clientmac": "0E2E5A6C69C3", "clientport": 41482, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "serverbytes": 167, "streamName": "trend micro_deep security agent", "clientIP": "242.181.129.195", "serverIP": "194.163.218.51" }
Create a JSON artifact from the message
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Stream Position :20', 'trend micro_deep security agent', 'DPI Flags:8'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 1 08:15:18 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0E94916CB4FB clientmac: 0E2E5A6C69C3 clientport: 41482 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 serverbytes: 167 streamName: trend micro_deep security agent clientIP: 242.181.129.195 serverIP: 194.163.218.51
Explain this syslog message
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "DPI Note:HTTPTraffic", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Stream Position :20", "trend micro_deep security agent", "DPI Flags:8" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags", "localstarttime": "Oct 1 08:15:18", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0E94916CB4FB", "clientmac": "0E2E5A6C69C3", "clientport": 41482, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "serverbytes": 167, "streamName": "trend micro_deep security agent", "clientIP": "207.198.112.205", "serverIP": "107.35.117.239" }
Create a JSON artifact from the message
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Stream Position :20', 'trend micro_deep security agent', 'DPI Flags:8'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 1 08:15:18 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0E94916CB4FB clientmac: 0E2E5A6C69C3 clientport: 41482 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 serverbytes: 167 streamName: trend micro_deep security agent clientIP: 207.198.112.205 serverIP: 107.35.117.239
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t98.21.18.181\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"98.21.18.181","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
{ "action": "Logon", "clientport": 52514, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t98.21.18.181\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"98.21.18.181\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793060", "streamName": "microsoft-windows-security-auditing", "clientIP": "98.21.18.181", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t98.21.18.181\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"98.21.18.181","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t98.21.18.181\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"98.21.18.181","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52514 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793060 streamName: microsoft-windows-security-auditing clientIP: 98.21.18.181 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t67.168.6.132\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.168.6.132","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
{ "action": "Logon", "clientport": 52514, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t67.168.6.132\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"67.168.6.132\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793060", "streamName": "microsoft-windows-security-auditing", "clientIP": "67.168.6.132", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t67.168.6.132\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.168.6.132","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t67.168.6.132\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.168.6.132","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52514 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793060 streamName: microsoft-windows-security-auditing clientIP: 67.168.6.132 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t136.253.56.122\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.253.56.122","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
{ "action": "Logon", "clientport": 52509, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t136.253.56.122\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"136.253.56.122\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793057", "streamName": "microsoft-windows-security-auditing", "clientIP": "136.253.56.122", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t136.253.56.122\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.253.56.122","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t136.253.56.122\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.253.56.122","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52509 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793057 streamName: microsoft-windows-security-auditing clientIP: 136.253.56.122 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t30.247.202.193\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"30.247.202.193","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
{ "action": "Logon", "clientport": 52509, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t30.247.202.193\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"30.247.202.193\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793057", "streamName": "microsoft-windows-security-auditing", "clientIP": "30.247.202.193", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t30.247.202.193\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"30.247.202.193","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t30.247.202.193\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"30.247.202.193","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52509 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793057 streamName: microsoft-windows-security-auditing clientIP: 30.247.202.193 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t77.53.127.246\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"77.53.127.246","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
{ "action": "Logon", "clientport": 52504, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t77.53.127.246\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"77.53.127.246\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793054", "streamName": "microsoft-windows-security-auditing", "clientIP": "77.53.127.246", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t77.53.127.246\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"77.53.127.246","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t77.53.127.246\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"77.53.127.246","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52504 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793054 streamName: microsoft-windows-security-auditing clientIP: 77.53.127.246 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t137.164.89.154\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"137.164.89.154","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
{ "action": "Logon", "clientport": 52504, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t137.164.89.154\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"137.164.89.154\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793054", "streamName": "microsoft-windows-security-auditing", "clientIP": "137.164.89.154", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t137.164.89.154\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"137.164.89.154","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t137.164.89.154\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"137.164.89.154","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52504 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793054 streamName: microsoft-windows-security-auditing clientIP: 137.164.89.154 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t177.126.35.197\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.126.35.197","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
{ "action": "Logon", "clientport": 52514, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t177.126.35.197\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"177.126.35.197\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793060", "streamName": "microsoft-windows-security-auditing", "clientIP": "177.126.35.197", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t177.126.35.197\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.126.35.197","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t177.126.35.197\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.126.35.197","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52514 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793060 streamName: microsoft-windows-security-auditing clientIP: 177.126.35.197 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t55.84.82.110\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.84.82.110","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
{ "action": "Logon", "clientport": 52514, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tUMBRELLA\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t55.84.82.110\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"55.84.82.110\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"UMBRELLA\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793060", "streamName": "microsoft-windows-security-auditing", "clientIP": "55.84.82.110", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t55.84.82.110\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.84.82.110","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t55.84.82.110\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.84.82.110","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52514 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793060 streamName: microsoft-windows-security-auditing clientIP: 55.84.82.110 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t161.84.116.114\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"161.84.116.114","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
{ "action": "Logon", "clientport": 52509, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t161.84.116.114\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"161.84.116.114\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793057", "streamName": "microsoft-windows-security-auditing", "clientIP": "161.84.116.114", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t161.84.116.114\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"161.84.116.114","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t161.84.116.114\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"161.84.116.114","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52509 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793057 streamName: microsoft-windows-security-auditing clientIP: 161.84.116.114 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t23.132.199.137\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.132.199.137","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
{ "action": "Logon", "clientport": 52509, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t23.132.199.137\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"23.132.199.137\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793057", "streamName": "microsoft-windows-security-auditing", "clientIP": "23.132.199.137", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t23.132.199.137\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.132.199.137","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t23.132.199.137\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.132.199.137","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52509 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793057 streamName: microsoft-windows-security-auditing clientIP: 23.132.199.137 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t235.89.104.109\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.89.104.109","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
{ "action": "Logon", "clientport": 52504, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t235.89.104.109\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"235.89.104.109\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793054", "streamName": "microsoft-windows-security-auditing", "clientIP": "235.89.104.109", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t235.89.104.109\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.89.104.109","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t235.89.104.109\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.89.104.109","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52504 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793054 streamName: microsoft-windows-security-auditing clientIP: 235.89.104.109 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t222.205.201.53\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.205.201.53","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
{ "action": "Logon", "clientport": 52504, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tUMBRELLA\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t222.205.201.53\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"222.205.201.53\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"UMBRELLA\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "UWDC3.uwca.org", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "89793054", "streamName": "microsoft-windows-security-auditing", "clientIP": "222.205.201.53", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t222.205.201.53\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.205.201.53","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t222.205.201.53\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.205.201.53","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52504 messagetype: auth_failure productids: [6] senderhost: UWDC3.uwca.org sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 89793054 streamName: microsoft-windows-security-auditing clientIP: 222.205.201.53 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"107.160.112.128","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Pewaynetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"fish@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"fish"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664390391", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "66.216.193.16", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=66.216.193.16 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"107.160.112.128\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"66.216.193.16\",\"key\":\"DP2BL85X6KR4J9B9B7N1\",\"location\":{\"city\":\"Pewaynetree City\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-301-1486\"},\"email\":\"fish@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:39:51.016656+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390391,\"txid\":\"684dce55-64bc-4014-b0db-0d3ee0de2c79\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU41R9N3WD9GOEOFT6T\",\"name\":\"fish\"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "107.160.112.128", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"107.160.112.128","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Pewaynetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"fish@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"fish"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"107.160.112.128","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Pewaynetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"fish@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"fish"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664390391 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 66.216.193.16 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 107.160.112.128 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"254.214.6.198","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Peacmetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"alice"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664390391", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "66.216.193.16", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=66.216.193.16 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"254.214.6.198\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"66.216.193.16\",\"key\":\"DP2BL85X6KR4J9B9B7N1\",\"location\":{\"city\":\"Peacmetree City\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-301-1486\"},\"email\":\"alice@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:39:51.016656+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390391,\"txid\":\"684dce55-64bc-4014-b0db-0d3ee0de2c79\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU41R9N3WD9GOEOFT6T\",\"name\":\"alice\"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "254.214.6.198", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"254.214.6.198","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Peacmetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"alice"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"254.214.6.198","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Peacmetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"alice"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664390391 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 66.216.193.16 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 254.214.6.198 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.137.242.0","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@wayne.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"bob"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664391505", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=bypass_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"157.137.242.0\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Novel Access IP\",\"trust_level\":\"LOW\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@wayne.com\",\"event_type\":\"authentication\",\"factor\":null,\"isotimestamp\":\"2022-09-28T18:58:25.402701+00:00\",\"ood_software\":null,\"reason\":\"bypass_user\",\"result\":\"success\",\"timestamp\":1664391505,\"txid\":\"1da936c8-afe7-4188-82d5-d3a92da7c698\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUYBV08W0XMY31EKUDDT\",\"name\":\"bob\"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "157.137.242.0", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.137.242.0","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@wayne.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"bob"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.137.242.0","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@wayne.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"bob"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664391505 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 157.137.242.0 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"241.120.115.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@stark.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"alice"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664391505", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=bypass_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"241.120.115.6\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Novel Access IP\",\"trust_level\":\"LOW\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"alice@stark.com\",\"event_type\":\"authentication\",\"factor\":null,\"isotimestamp\":\"2022-09-28T18:58:25.402701+00:00\",\"ood_software\":null,\"reason\":\"bypass_user\",\"result\":\"success\",\"timestamp\":1664391505,\"txid\":\"1da936c8-afe7-4188-82d5-d3a92da7c698\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUYBV08W0XMY31EKUDDT\",\"name\":\"alice\"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "241.120.115.6", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"241.120.115.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@stark.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"alice"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"241.120.115.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@stark.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"alice"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664391505 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 241.120.115.6 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"130.130.70.57","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"alice"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664390759", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "104.57.143.30", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=104.57.143.30 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"130.130.70.57\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"104.57.143.30\",\"key\":\"DPLEDCBGTCNYR4ZGYUWR\",\"location\":{\"city\":\"Lawrenceville\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-585-3819\"},\"email\":\"alice@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:45:59.200307+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390759,\"txid\":\"be534145-29ea-4bdf-8b1a-c578a69b6a24\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUUXA1FSHP9SST6I3PAF\",\"name\":\"alice\"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "130.130.70.57", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"130.130.70.57","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"alice"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"130.130.70.57","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"alice"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664390759 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 104.57.143.30 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 130.130.70.57 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"196.16.172.215","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"fish"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664390759", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "104.57.143.30", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=104.57.143.30 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"196.16.172.215\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"104.57.143.30\",\"key\":\"DPLEDCBGTCNYR4ZGYUWR\",\"location\":{\"city\":\"Lawrenceville\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-585-3819\"},\"email\":\"fish@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:45:59.200307+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390759,\"txid\":\"be534145-29ea-4bdf-8b1a-c578a69b6a24\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUUXA1FSHP9SST6I3PAF\",\"name\":\"fish\"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "196.16.172.215", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"196.16.172.215","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"fish"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"196.16.172.215","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"fish"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664390759 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 104.57.143.30 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 196.16.172.215 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"240.28.185.102","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"charlie"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664390688", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "75.146.93.165", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.146.93.165 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"240.28.185.102\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.146.93.165\",\"key\":\"DPVIFCUAU7XAF1ETBLS9\",\"location\":{\"city\":\"Savannah\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-663-7294\"},\"email\":\"charlie@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:44:48.168687+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390688,\"txid\":\"c41a55c4-524e-4a02-b42a-be52c7a4cbb4\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8YY3NECNP8JFXUSTWX\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "240.28.185.102", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"240.28.185.102","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"charlie"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"240.28.185.102","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"charlie"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664390688 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 75.146.93.165 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 240.28.185.102 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"21.56.56.3","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"fish"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1664390688", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "75.146.93.165", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "TS03", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.146.93.165 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"21.56.56.3\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.146.93.165\",\"key\":\"DPVIFCUAU7XAF1ETBLS9\",\"location\":{\"city\":\"Savannah\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-663-7294\"},\"email\":\"fish@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:44:48.168687+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390688,\"txid\":\"c41a55c4-524e-4a02-b42a-be52c7a4cbb4\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8YY3NECNP8JFXUSTWX\",\"name\":\"fish\"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "21.56.56.3", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"21.56.56.3","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"fish"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"21.56.56.3","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"fish"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1664390688 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 75.146.93.165 sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: TS03 streamName: DUO clientIP: 21.56.56.3 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"janedoe","email":"janedoe"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"janedoe","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"janedoe\",\"email\":\"janedoe\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"janedoe\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"69.177.195.46\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"69.177.195.46\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "69.177.195.46", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"janedoe","email":"janedoe"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"janedoe","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"janedoe","email":"janedoe"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"janedoe","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 69.177.195.46 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"115.175.121.214\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"115.175.121.214\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "115.175.121.214", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 115.175.121.214 userName: fish
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"alice","email":"alice"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"alice","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"alice\",\"email\":\"alice\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"alice\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"252.104.142.5\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"252.104.142.5\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "252.104.142.5", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"alice","email":"alice"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"alice","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"alice","email":"alice"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"alice","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 252.104.142.5 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"charlie","email":"charlie"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"charlie","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"charlie\",\"email\":\"charlie\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"charlie\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"183.69.40.2\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"183.69.40.2\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "UNKNOWN", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "tags": [ "userDisplay=undefined | undefined", "reason=WitFoo.Switch(FAILURE)", "Okta", "description=Authenticate user with AD agent", "auth_failure" ], "vendorcode": "user.authentication.auth_via_AD_agent", "streamName": "Okta", "clientIP": "183.69.40.2", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"charlie","email":"charlie"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"charlie","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"charlie","email":"charlie"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"charlie","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: UNKNOWN senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure'] vendorcode: user.authentication.auth_via_AD_agent streamName: Okta clientIP: 183.69.40.2 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t241.74.198.24\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.74.198.24","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
{ "action": "Logon", "clientport": 55929, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t241.74.198.24\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"241.74.198.24\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "453526063", "streamName": "microsoft-windows-security-auditing", "clientIP": "241.74.198.24", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t241.74.198.24\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.74.198.24","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t241.74.198.24\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.74.198.24","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 55929 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 453526063 streamName: microsoft-windows-security-auditing clientIP: 241.74.198.24 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t0.127.202.209\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"0.127.202.209","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
{ "action": "Logon", "clientport": 55929, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t0.127.202.209\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"0.127.202.209\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "453526063", "streamName": "microsoft-windows-security-auditing", "clientIP": "0.127.202.209", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t0.127.202.209\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"0.127.202.209","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t0.127.202.209\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"0.127.202.209","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 55929 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 453526063 streamName: microsoft-windows-security-auditing clientIP: 0.127.202.209 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t116.207.226.42\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.207.226.42","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
{ "action": "Logon", "clientport": 55929, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t116.207.226.42\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DC-04.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"116.207.226.42\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "453526063", "streamName": "microsoft-windows-security-auditing", "clientIP": "116.207.226.42", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t116.207.226.42\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.207.226.42","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message