input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t111.34.122.180\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"111.34.122.180","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t111.34.122.180\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"111.34.122.180","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58544
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7041174682
streamName: microsoft-windows-security-auditing
clientIP: 111.34.122.180
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t180.140.107.39\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"180.140.107.39","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | {
"action": "Logon",
"clientport": 58544,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-15T18:09:32.336Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-15T18:09:33.153Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e8\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t180.140.107.39\\n\\tSource Port:\\t\\t58544\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"180.140.107.39\",\"IpPort\":\"58544\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e8\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":5924}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7041174682,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7041174682",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "180.140.107.39",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t180.140.107.39\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"180.140.107.39","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t180.140.107.39\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"180.140.107.39","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58544
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7041174682
streamName: microsoft-windows-security-auditing
clientIP: 180.140.107.39
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t71.139.39.55\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"71.139.39.55","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | {
"action": "Logon",
"clientport": 58544,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-15T18:09:32.336Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-15T18:09:33.153Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e8\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t71.139.39.55\\n\\tSource Port:\\t\\t58544\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"71.139.39.55\",\"IpPort\":\"58544\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e8\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":5924}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7041174682,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7041174682",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "71.139.39.55",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t71.139.39.55\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"71.139.39.55","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-15T18:09:32.336Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-15T18:09:33.153Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e8\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t71.139.39.55\n\tSource Port:\t\t58544\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"71.139.39.55","IpPort":"58544","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e8","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":5924}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7041174682,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 58544
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7041174682
streamName: microsoft-windows-security-auditing
clientIP: 71.139.39.55
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t72.163.70.254\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"72.163.70.254","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | {
"action": "Logon",
"clientport": 14675,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-30T17:15:24.532Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-30T17:15:26.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t72.163.70.254\\n\\tSource Port:\\t\\t14675\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"72.163.70.254\",\"IpPort\":\"14675\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6274014101,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6274014101",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "72.163.70.254",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t72.163.70.254\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"72.163.70.254","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t72.163.70.254\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"72.163.70.254","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 14675
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6274014101
streamName: microsoft-windows-security-auditing
clientIP: 72.163.70.254
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t125.91.133.47\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"125.91.133.47","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | {
"action": "Logon",
"clientport": 14675,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-30T17:15:24.532Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-30T17:15:26.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t125.91.133.47\\n\\tSource Port:\\t\\t14675\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"125.91.133.47\",\"IpPort\":\"14675\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6274014101,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6274014101",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "125.91.133.47",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t125.91.133.47\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"125.91.133.47","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t125.91.133.47\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"125.91.133.47","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 14675
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6274014101
streamName: microsoft-windows-security-auditing
clientIP: 125.91.133.47
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t219.33.254.54\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"219.33.254.54","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | {
"action": "Logon",
"clientport": 14675,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-30T17:15:24.532Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-30T17:15:26.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t219.33.254.54\\n\\tSource Port:\\t\\t14675\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"219.33.254.54\",\"IpPort\":\"14675\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6274014101,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6274014101",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "219.33.254.54",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t219.33.254.54\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"219.33.254.54","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t219.33.254.54\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"219.33.254.54","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 14675
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6274014101
streamName: microsoft-windows-security-auditing
clientIP: 219.33.254.54
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t139.162.102.222\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"139.162.102.222","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | {
"action": "Logon",
"clientport": 14675,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-30T17:15:24.532Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-30T17:15:26.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t139.162.102.222\\n\\tSource Port:\\t\\t14675\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"139.162.102.222\",\"IpPort\":\"14675\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":19584}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6274014101,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6274014101",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "139.162.102.222",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t139.162.102.222\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"139.162.102.222","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-30T17:15:24.532Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-30T17:15:26.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t139.162.102.222\n\tSource Port:\t\t14675\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"139.162.102.222","IpPort":"14675","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":19584}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6274014101,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 14675
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6274014101
streamName: microsoft-windows-security-auditing
clientIP: 139.162.102.222
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t32.48.189.13\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"32.48.189.13","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43830,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-28T18:00:35.732Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-28T18:00:37.048Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e0\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t32.48.189.13\\n\\tSource Port:\\t\\t43830\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"32.48.189.13\",\"IpPort\":\"43830\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e0\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":29344}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6717320436,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6717320436",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "32.48.189.13",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t32.48.189.13\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"32.48.189.13","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t32.48.189.13\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"32.48.189.13","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43830
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6717320436
streamName: microsoft-windows-security-auditing
clientIP: 32.48.189.13
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t145.198.241.196\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"145.198.241.196","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43830,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-28T18:00:35.732Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-28T18:00:37.048Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e0\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t145.198.241.196\\n\\tSource Port:\\t\\t43830\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"145.198.241.196\",\"IpPort\":\"43830\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e0\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":29344}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6717320436,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6717320436",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "145.198.241.196",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t145.198.241.196\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"145.198.241.196","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t145.198.241.196\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"145.198.241.196","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43830
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6717320436
streamName: microsoft-windows-security-auditing
clientIP: 145.198.241.196
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t90.115.147.228\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"90.115.147.228","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43830,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-28T18:00:35.732Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-28T18:00:37.048Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e0\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t90.115.147.228\\n\\tSource Port:\\t\\t43830\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"90.115.147.228\",\"IpPort\":\"43830\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e0\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":29344}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6717320436,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6717320436",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "90.115.147.228",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t90.115.147.228\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"90.115.147.228","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t90.115.147.228\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"90.115.147.228","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43830
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6717320436
streamName: microsoft-windows-security-auditing
clientIP: 90.115.147.228
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t0.98.76.53\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"0.98.76.53","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | {
"action": "Logon",
"clientport": 43830,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-28T18:00:35.732Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-28T18:00:37.048Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\t03SDPBSVR03$\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2e0\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\t03SDPBSVR03\\n\\tSource Network Address:\\t0.98.76.53\\n\\tSource Port:\\t\\t43830\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"0.98.76.53\",\"IpPort\":\"43830\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2e0\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"03SDPBSVR03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"03SDPBSVR03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":29344}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6717320436,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6717320436",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "0.98.76.53",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t0.98.76.53\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"0.98.76.53","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-28T18:00:35.732Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-28T18:00:37.048Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\t03SDPBSVR03$\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x2e0\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\t03SDPBSVR03\n\tSource Network Address:\t0.98.76.53\n\tSource Port:\t\t43830\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"0.98.76.53","IpPort":"43830","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2e0","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"SDPB","SubjectLogonId":"0x3e7","SubjectUserName":"03SDPBSVR03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"03SDPBSVR03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":29344}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6717320436,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 43830
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6717320436
streamName: microsoft-windows-security-auditing
clientIP: 0.98.76.53
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t137.6.254.133\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"137.6.254.133","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-22T01:26:31.290Z\",\"agent\":{\"ephemeral_id\":\"13a86fb4-1bb5-4064-94cc-73901faa2f54\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-22T01:26:32.892Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tBODC1$\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2b4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC1\\n\\tSource Network Address:\\t137.6.254.133\\n\\tSource Port:\\t\\t63432\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"WAYNE (wayne.waynecloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"137.6.254.133\",\"IpPort\":\"63432\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2b4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"BACKOFFICE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"BODC1$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":14964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7744523,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 63432,
"vendorcode": "7744523",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "137.6.254.133",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t137.6.254.133\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"137.6.254.133","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t137.6.254.133\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"WAYNE (wayne.waynecloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"137.6.254.133","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 63432
vendorcode: 7744523
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 137.6.254.133
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t108.159.38.26\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"108.159.38.26","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-22T01:26:31.290Z\",\"agent\":{\"ephemeral_id\":\"13a86fb4-1bb5-4064-94cc-73901faa2f54\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-22T01:26:32.892Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tBODC1$\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2b4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC1\\n\\tSource Network Address:\\t108.159.38.26\\n\\tSource Port:\\t\\t63432\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"OSCORP (oscorp.oscorpcloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"108.159.38.26\",\"IpPort\":\"63432\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2b4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"BACKOFFICE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"BODC1$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":14964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7744523,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 63432,
"vendorcode": "7744523",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "108.159.38.26",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t108.159.38.26\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"108.159.38.26","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t108.159.38.26\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"108.159.38.26","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 63432
vendorcode: 7744523
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 108.159.38.26
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t135.96.203.128\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"135.96.203.128","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"UMBRELLA","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-22T01:26:31.290Z\",\"agent\":{\"ephemeral_id\":\"13a86fb4-1bb5-4064-94cc-73901faa2f54\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-22T01:26:32.892Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tBODC1$\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tUMBRELLA\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2b4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC1\\n\\tSource Network Address:\\t135.96.203.128\\n\\tSource Port:\\t\\t63432\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"UMBRELLA (umbrella.umbrellacloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"135.96.203.128\",\"IpPort\":\"63432\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2b4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"BACKOFFICE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"BODC1$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"UMBRELLA\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":14964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7744523,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 63432,
"vendorcode": "7744523",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "135.96.203.128",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t135.96.203.128\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"135.96.203.128","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"UMBRELLA","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t135.96.203.128\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"135.96.203.128","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"UMBRELLA","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 63432
vendorcode: 7744523
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 135.96.203.128
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t249.186.44.59\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"249.186.44.59","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-22T01:26:31.290Z\",\"agent\":{\"ephemeral_id\":\"13a86fb4-1bb5-4064-94cc-73901faa2f54\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-22T01:26:32.892Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tBODC1$\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2b4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC1\\n\\tSource Network Address:\\t249.186.44.59\\n\\tSource Port:\\t\\t63432\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"249.186.44.59\",\"IpPort\":\"63432\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2b4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"BACKOFFICE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"BODC1$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":14964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7744523,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 63432,
"vendorcode": "7744523",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "249.186.44.59",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t249.186.44.59\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"249.186.44.59","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t249.186.44.59\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"249.186.44.59","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 63432
vendorcode: 7744523
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 249.186.44.59
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t243.247.47.85\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"243.247.47.85","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-22T01:26:31.290Z\",\"agent\":{\"ephemeral_id\":\"13a86fb4-1bb5-4064-94cc-73901faa2f54\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-22T01:26:32.892Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tBODC1$\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2b4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC1\\n\\tSource Network Address:\\t243.247.47.85\\n\\tSource Port:\\t\\t63432\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"243.247.47.85\",\"IpPort\":\"63432\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2b4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"BACKOFFICE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"BODC1$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":14964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7744523,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 63432,
"vendorcode": "7744523",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "243.247.47.85",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t243.247.47.85\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"243.247.47.85","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t243.247.47.85\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"243.247.47.85","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 63432
vendorcode: 7744523
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 243.247.47.85
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t6.163.179.158\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"6.163.179.158","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | {
"senderhost": "BODC1.backoffice.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-22T01:26:31.290Z\",\"agent\":{\"ephemeral_id\":\"13a86fb4-1bb5-4064-94cc-73901faa2f54\",\"id\":\"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc\",\"name\":\"BODC1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-08-22T01:26:32.892Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"BODC1.backoffice.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tBODC1$\\n\\tAccount Domain:\\t\\tBACKOFFICE\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tThe specified account's password has expired.\\n\\tStatus:\\t\\t\\t0xC000006E\\n\\tSub Status:\\t\\t0xC0000071\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x2b4\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tBODC1\\n\\tSource Network Address:\\t6.163.179.158\\n\\tSource Port:\\t\\t63432\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"BODC1.backoffice.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"BODC1.backoffice.org\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2309\",\"IpAddress\":\"6.163.179.158\",\"IpPort\":\"63432\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x2b4\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006e\",\"SubStatus\":\"0xc0000071\",\"SubjectDomainName\":\"BACKOFFICE\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"BODC1$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"BODC1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":692,\"thread\":{\"id\":14964}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7744523,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 63432,
"vendorcode": "7744523",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "6.163.179.158",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t6.163.179.158\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"6.163.179.158","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-22T01:26:31.290Z","agent":{"ephemeral_id":"13a86fb4-1bb5-4064-94cc-73901faa2f54","id":"5ad5e2eb-1911-45ad-86a1-8e08345e6dcc","name":"BODC1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-08-22T01:26:32.892Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"BODC1.backoffice.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tBODC1$\n\tAccount Domain:\t\tBACKOFFICE\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tThe specified account's password has expired.\n\tStatus:\t\t\t0xC000006E\n\tSub Status:\t\t0xC0000071\n\nProcess Information:\n\tCaller Process ID:\t0x2b4\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tBODC1\n\tSource Network Address:\t6.163.179.158\n\tSource Port:\t\t63432\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"BODC1.backoffice.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"BODC1.backoffice.org","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2309","IpAddress":"6.163.179.158","IpPort":"63432","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x2b4","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006e","SubStatus":"0xc0000071","SubjectDomainName":"BACKOFFICE","SubjectLogonId":"0x3e7","SubjectUserName":"BODC1$","SubjectUserSid":"S-1-5-18","TargetDomainName":"STARK","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"BODC1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":692,"thread":{"id":14964}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7744523,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: BODC1.backoffice.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 63432
vendorcode: 7744523
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 6.163.179.158
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPQBH986XRMKQADWVHDI","flash_version":"uninstalled","hostname":null,"ip":"62.18.122.111","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@holdenaswayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:46:49.765340+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777609,"txid":"3393ecb7-5ef4-480d-9da2-97afa7bc64f6","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUN96LDSU6P9SP7RX40V","name":"fish"}} ::: program=Chrome ::: clientIP=62.18.122.111 ::: userName=fish ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675777609",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"109.0.5414.120\",\"epkey\":\"EPQBH986XRMKQADWVHDI\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"62.18.122.111\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pewaynetree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIKQVT8SKWPB8J2K3BBQ\",\"name\":\"POS - Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"fish@holdenaswayne.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-07T13:46:49.765340+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1675777609,\"txid\":\"3393ecb7-5ef4-480d-9da2-97afa7bc64f6\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUN96LDSU6P9SP7RX40V\",\"name\":\"fish\"}} ::: program=Chrome ::: clientIP=62.18.122.111 ::: userName=fish ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "POS - Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "62.18.122.111",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPQBH986XRMKQADWVHDI","flash_version":"uninstalled","hostname":null,"ip":"62.18.122.111","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@holdenaswayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:46:49.765340+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777609,"txid":"3393ecb7-5ef4-480d-9da2-97afa7bc64f6","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUN96LDSU6P9SP7RX40V","name":"fish"}} ::: program=Chrome ::: clientIP=62.18.122.111 ::: userName=fish ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPQBH986XRMKQADWVHDI","flash_version":"uninstalled","hostname":null,"ip":"62.18.122.111","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@holdenaswayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:46:49.765340+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777609,"txid":"3393ecb7-5ef4-480d-9da2-97afa7bc64f6","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUN96LDSU6P9SP7RX40V","name":"fish"}} ::: program=Chrome ::: clientIP=62.18.122.111 ::: userName=fish ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1675777609
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: POS - Production
messagetype: credential_access
streamName: DUO
clientIP: 62.18.122.111
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPQBH986XRMKQADWVHDI","flash_version":"uninstalled","hostname":null,"ip":"79.156.149.211","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@holdenasstark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:46:49.765340+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777609,"txid":"3393ecb7-5ef4-480d-9da2-97afa7bc64f6","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUN96LDSU6P9SP7RX40V","name":"bob"}} ::: program=Chrome ::: clientIP=79.156.149.211 ::: userName=bob ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675777609",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"109.0.5414.120\",\"epkey\":\"EPQBH986XRMKQADWVHDI\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"79.156.149.211\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pestarktree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIKQVT8SKWPB8J2K3BBQ\",\"name\":\"POS - Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@holdenasstark.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-07T13:46:49.765340+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1675777609,\"txid\":\"3393ecb7-5ef4-480d-9da2-97afa7bc64f6\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUN96LDSU6P9SP7RX40V\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=79.156.149.211 ::: userName=bob ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "POS - Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "79.156.149.211",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPQBH986XRMKQADWVHDI","flash_version":"uninstalled","hostname":null,"ip":"79.156.149.211","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@holdenasstark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:46:49.765340+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777609,"txid":"3393ecb7-5ef4-480d-9da2-97afa7bc64f6","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUN96LDSU6P9SP7RX40V","name":"bob"}} ::: program=Chrome ::: clientIP=79.156.149.211 ::: userName=bob ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPQBH986XRMKQADWVHDI","flash_version":"uninstalled","hostname":null,"ip":"79.156.149.211","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@holdenasstark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:46:49.765340+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777609,"txid":"3393ecb7-5ef4-480d-9da2-97afa7bc64f6","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUN96LDSU6P9SP7RX40V","name":"bob"}} ::: program=Chrome ::: clientIP=79.156.149.211 ::: userName=bob ::: created_at=1675777609 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777609 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1675777609
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: POS - Production
messagetype: credential_access
streamName: DUO
clientIP: 79.156.149.211
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"79.106.197.178","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"charlie"}} ::: program=Chrome ::: clientIP=79.106.197.178 ::: userName=charlie ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675777674",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"109.0.5414.120\",\"epkey\":\"EPNOHDH1XC55H620PH2P\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"79.106.197.178\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pestarktree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIJUUWX4H8G09X8JNJVJ\",\"name\":\"MingApps Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-07T13:47:54.751047+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1675777674,\"txid\":\"0cab5084-2afb-4019-8ac2-22e082ff2953\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUTN7US0R9YUW0DKEEUF\",\"name\":\"charlie\"}} ::: program=Chrome ::: clientIP=79.106.197.178 ::: userName=charlie ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "MingApps Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "79.106.197.178",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"79.106.197.178","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"charlie"}} ::: program=Chrome ::: clientIP=79.106.197.178 ::: userName=charlie ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"79.106.197.178","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pestarktree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"charlie"}} ::: program=Chrome ::: clientIP=79.106.197.178 ::: userName=charlie ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1675777674
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: MingApps Production
messagetype: credential_access
streamName: DUO
clientIP: 79.106.197.178
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"24.95.230.26","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"bob"}} ::: program=Chrome ::: clientIP=24.95.230.26 ::: userName=bob ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675777674",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"109.0.5414.120\",\"epkey\":\"EPNOHDH1XC55H620PH2P\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"24.95.230.26\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Peoscorptree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIJUUWX4H8G09X8JNJVJ\",\"name\":\"MingApps Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-07T13:47:54.751047+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1675777674,\"txid\":\"0cab5084-2afb-4019-8ac2-22e082ff2953\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUTN7US0R9YUW0DKEEUF\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=24.95.230.26 ::: userName=bob ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "MingApps Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "24.95.230.26",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"24.95.230.26","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"bob"}} ::: program=Chrome ::: clientIP=24.95.230.26 ::: userName=bob ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"24.95.230.26","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Peoscorptree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"bob"}} ::: program=Chrome ::: clientIP=24.95.230.26 ::: userName=bob ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1675777674
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: MingApps Production
messagetype: credential_access
streamName: DUO
clientIP: 24.95.230.26
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"244.233.46.147","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@wayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"alice"}} ::: program=Chrome ::: clientIP=244.233.46.147 ::: userName=alice ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675777674",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"109.0.5414.120\",\"epkey\":\"EPNOHDH1XC55H620PH2P\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"244.233.46.147\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pewaynetree Corners\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIJUUWX4H8G09X8JNJVJ\",\"name\":\"MingApps Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"alice@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-07T13:47:54.751047+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1675777674,\"txid\":\"0cab5084-2afb-4019-8ac2-22e082ff2953\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUTN7US0R9YUW0DKEEUF\",\"name\":\"alice\"}} ::: program=Chrome ::: clientIP=244.233.46.147 ::: userName=alice ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "MingApps Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "244.233.46.147",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"244.233.46.147","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@wayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"alice"}} ::: program=Chrome ::: clientIP=244.233.46.147 ::: userName=alice ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"109.0.5414.120","epkey":"EPNOHDH1XC55H620PH2P","flash_version":"uninstalled","hostname":null,"ip":"244.233.46.147","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pewaynetree Corners","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIJUUWX4H8G09X8JNJVJ","name":"MingApps Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@wayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-07T13:47:54.751047+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1675777674,"txid":"0cab5084-2afb-4019-8ac2-22e082ff2953","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUTN7US0R9YUW0DKEEUF","name":"alice"}} ::: program=Chrome ::: clientIP=244.233.46.147 ::: userName=alice ::: created_at=1675777674 ::: streamName=DUO ::: application=MingApps Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675777674 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1675777674
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: MingApps Production
messagetype: credential_access
streamName: DUO
clientIP: 244.233.46.147
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\charlie\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"charlie","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=142.228.108.148 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=charlie ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "CGATES-LT.undefined",
"clientmac": "00ff21247f5a",
"filehash": "b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"bc973bccb751496b9a4f0acdd3072e43\",\"timestamp\":\"2023-05-02T18:33:03Z\",\"behavior_id\":\"5734\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Moscorpine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Cloud-based ML\",\"technique_id\":\"CST0008\",\"display_name\":\"\",\"description\":\"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.\",\"severity\":70,\"confidence\":70,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\charlie\\\\Downloads\\\\ransim\\\\SimulatorSetup.exe\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-4034892786-1127594642-3000148911-3523002053\",\"control_graph_id\":\"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546\",\"triggering_process_graph_id\":\"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525\",\"sha256\":\"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=142.228.108.148 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: userName=charlie ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-02T18:33:03Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "142.228.108.148",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\charlie\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"charlie","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=142.228.108.148 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=charlie ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Moscorpine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\charlie\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"charlie","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=142.228.108.148 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=charlie ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: CGATES-LT.undefined
clientmac: 00ff21247f5a
filehash: b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-05-02T18:33:03Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 142.228.108.148
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"bob","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=57.184.19.168 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=bob ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "CGATES-LT.undefined",
"clientmac": "00ff21247f5a",
"filehash": "b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"bc973bccb751496b9a4f0acdd3072e43\",\"timestamp\":\"2023-05-02T18:33:03Z\",\"behavior_id\":\"5734\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mumbrellaine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Cloud-based ML\",\"technique_id\":\"CST0008\",\"display_name\":\"\",\"description\":\"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.\",\"severity\":70,\"confidence\":70,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\bob\\\\Downloads\\\\ransim\\\\SimulatorSetup.exe\",\"user_name\":\"bob\",\"user_id\":\"S-1-12-1-4034892786-1127594642-3000148911-3523002053\",\"control_graph_id\":\"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546\",\"triggering_process_graph_id\":\"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525\",\"sha256\":\"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=57.184.19.168 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: userName=bob ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-02T18:33:03Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "57.184.19.168",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"bob","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=57.184.19.168 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=bob ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\bob\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"bob","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=57.184.19.168 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=bob ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: CGATES-LT.undefined
clientmac: 00ff21247f5a
filehash: b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-05-02T18:33:03Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 57.184.19.168
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\fish\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"fish","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.191.15.81 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=fish ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "CGATES-LT.undefined",
"clientmac": "00ff21247f5a",
"filehash": "b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"bc973bccb751496b9a4f0acdd3072e43\",\"timestamp\":\"2023-05-02T18:33:03Z\",\"behavior_id\":\"5734\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mumbrellaine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Cloud-based ML\",\"technique_id\":\"CST0008\",\"display_name\":\"\",\"description\":\"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.\",\"severity\":70,\"confidence\":70,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\fish\\\\Downloads\\\\ransim\\\\SimulatorSetup.exe\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-4034892786-1127594642-3000148911-3523002053\",\"control_graph_id\":\"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546\",\"triggering_process_graph_id\":\"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525\",\"sha256\":\"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"\",\"parent_md5\":\"\",\"parent_cmdline\":\"\",\"parent_process_graph_id\":\"\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=59.191.15.81 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: userName=fish ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-02T18:33:03Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "59.191.15.81",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\fish\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"fish","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.191.15.81 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=fish ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"bc973bccb751496b9a4f0acdd3072e43","timestamp":"2023-05-02T18:33:03Z","behavior_id":"5734","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","alleged_filetype":"exe","cmdline":"C:\\Windows\\Explorer.EXE","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Cloud-based ML","technique_id":"CST0008","display_name":"","description":"A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.","severity":70,"confidence":70,"ioc_type":"hash_sha256","ioc_value":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume3\\Users\\fish\\Downloads\\ransim\\SimulatorSetup.exe","user_name":"fish","user_id":"S-1-12-1-4034892786-1127594642-3000148911-3523002053","control_graph_id":"ctg:bc973bccb751496b9a4f0acdd3072e43:38655428546","triggering_process_graph_id":"pid:bc973bccb751496b9a4f0acdd3072e43:257962090525","sha256":"b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9","md5":"","parent_details":{"parent_sha256":"","parent_md5":"","parent_cmdline":"","parent_process_graph_id":""},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.191.15.81 ::: fileHash=b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=fish ::: clientMAC=00ff21247f5a ::: created_at=2023-05-02T18:33:03Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-05-02T18:33:03Z ::: clientHostname=CGATES-LT.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: CGATES-LT.undefined
clientmac: 00ff21247f5a
filehash: b1fd18441460ed1bd9b6a8107f2f09ddc971ed33ddbca53c6a38124f6830b2d9
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-05-02T18:33:03Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 59.191.15.81
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t12.21.222.162\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"UWDC2.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.21.222.162","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | {
"senderhost": "UWDC2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-04-12T14:25:31.681Z\",\"agent\":{\"ephemeral_id\":\"91dd20f3-a80b-47ab-9958-7cd101ea3f39\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-04-12T14:25:33.197Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tUMBRELLA\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP3\\n\\tSource Network Address:\\t12.21.222.162\\n\\tSource Port:\\t\\t51602\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"UMBRELLA (umbrella.umbrellacloud.com)\",\"senderHost\":\"UWDC2.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"12.21.222.162\",\"IpPort\":\"51602\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"UMBRELLA\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":724,\"thread\":{\"id\":7944}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":49156198,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 51602,
"vendorcode": "49156198",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "12.21.222.162",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t12.21.222.162\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"UWDC2.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.21.222.162","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t12.21.222.162\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"UWDC2.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.21.222.162","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: UWDC2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 51602
vendorcode: 49156198
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 12.21.222.162
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t63.161.153.167\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.161.153.167","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | {
"senderhost": "UWDC2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-04-12T14:25:31.681Z\",\"agent\":{\"ephemeral_id\":\"91dd20f3-a80b-47ab-9958-7cd101ea3f39\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-04-12T14:25:33.197Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP3\\n\\tSource Network Address:\\t63.161.153.167\\n\\tSource Port:\\t\\t51602\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"63.161.153.167\",\"IpPort\":\"51602\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":724,\"thread\":{\"id\":7944}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":49156198,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 51602,
"vendorcode": "49156198",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "63.161.153.167",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t63.161.153.167\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.161.153.167","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t63.161.153.167\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.161.153.167","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: UWDC2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 51602
vendorcode: 49156198
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 63.161.153.167
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t31.80.207.111\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"31.80.207.111","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | {
"senderhost": "UWDC2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-04-12T14:25:31.681Z\",\"agent\":{\"ephemeral_id\":\"91dd20f3-a80b-47ab-9958-7cd101ea3f39\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-04-12T14:25:33.197Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP3\\n\\tSource Network Address:\\t31.80.207.111\\n\\tSource Port:\\t\\t51602\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"31.80.207.111\",\"IpPort\":\"51602\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":724,\"thread\":{\"id\":7944}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":49156198,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 51602,
"vendorcode": "49156198",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "31.80.207.111",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t31.80.207.111\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"31.80.207.111","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t31.80.207.111\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"31.80.207.111","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: UWDC2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 51602
vendorcode: 49156198
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 31.80.207.111
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t129.145.216.182\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.145.216.182","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | {
"senderhost": "UWDC2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-04-12T14:25:31.681Z\",\"agent\":{\"ephemeral_id\":\"91dd20f3-a80b-47ab-9958-7cd101ea3f39\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-04-12T14:25:33.197Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP3\\n\\tSource Network Address:\\t129.145.216.182\\n\\tSource Port:\\t\\t51602\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"129.145.216.182\",\"IpPort\":\"51602\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":724,\"thread\":{\"id\":7944}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":49156198,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 51602,
"vendorcode": "49156198",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "129.145.216.182",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t129.145.216.182\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.145.216.182","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t129.145.216.182\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"129.145.216.182","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: UWDC2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 51602
vendorcode: 49156198
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 129.145.216.182
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t1.152.185.76\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"1.152.185.76","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | {
"senderhost": "UWDC2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-04-12T14:25:31.681Z\",\"agent\":{\"ephemeral_id\":\"91dd20f3-a80b-47ab-9958-7cd101ea3f39\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-04-12T14:25:33.197Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSTARK\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP3\\n\\tSource Network Address:\\t1.152.185.76\\n\\tSource Port:\\t\\t51602\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"STARK (stark.starkcloud.com)\",\"senderHost\":\"UWDC2.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"1.152.185.76\",\"IpPort\":\"51602\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"STARK\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":724,\"thread\":{\"id\":7944}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":49156198,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 51602,
"vendorcode": "49156198",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "1.152.185.76",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t1.152.185.76\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"1.152.185.76","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSTARK\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t1.152.185.76\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"STARK (stark.starkcloud.com)","senderHost":"UWDC2.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"1.152.185.76","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"STARK","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: UWDC2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 51602
vendorcode: 49156198
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 1.152.185.76
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t179.132.21.5\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"179.132.21.5","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | {
"senderhost": "UWDC2.uwca.org",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-04-12T14:25:31.681Z\",\"agent\":{\"ephemeral_id\":\"91dd20f3-a80b-47ab-9958-7cd101ea3f39\",\"id\":\"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e\",\"name\":\"UWDC2\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-04-12T14:25:33.197Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC2.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tXAPP3\\n\\tSource Network Address:\\t179.132.21.5\\n\\tSource Port:\\t\\t51602\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"OSCORP (oscorp.oscorpcloud.com)\",\"senderHost\":\"UWDC2.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC2.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"179.132.21.5\",\"IpPort\":\"51602\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"XAPP3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":724,\"thread\":{\"id\":7944}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":49156198,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 51602,
"vendorcode": "49156198",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "179.132.21.5",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t179.132.21.5\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"179.132.21.5","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-04-12T14:25:31.681Z","agent":{"ephemeral_id":"91dd20f3-a80b-47ab-9958-7cd101ea3f39","id":"b8da8d70-8b64-44a2-8d25-667a7cf5ec9e","name":"UWDC2","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-04-12T14:25:33.197Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC2.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tXAPP3\n\tSource Network Address:\t179.132.21.5\n\tSource Port:\t\t51602\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"UWDC2.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC2.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"179.132.21.5","IpPort":"51602","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"XAPP3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":724,"thread":{"id":7944}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":49156198,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: UWDC2.uwca.org
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 51602
vendorcode: 49156198
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 179.132.21.5
userName: johndoe | Explain this syslog message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.oscorp.com|1695047794|access denied|163.118.92.192|https://shareholders.oscorp.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Sep 18 14:36:34",
"message": "<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.oscorp.com|1695047794|access denied|163.118.92.192|https://shareholders.oscorp.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1695047794",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "163.118.92.192"
} | Create a JSON artifact from the message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.oscorp.com|1695047794|access denied|163.118.92.192|https://shareholders.oscorp.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.oscorp.com|1695047794|access denied|163.118.92.192|https://shareholders.oscorp.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Sep 18 14:36:34
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1695047794
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 163.118.92.192 | Explain this syslog message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.umbrella.com|1695047794|access denied|42.63.100.58|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Sep 18 14:36:34",
"message": "<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.umbrella.com|1695047794|access denied|42.63.100.58|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1695047794",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "42.63.100.58"
} | Create a JSON artifact from the message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.umbrella.com|1695047794|access denied|42.63.100.58|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.umbrella.com|1695047794|access denied|42.63.100.58|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Sep 18 14:36:34
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1695047794
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 42.63.100.58 | Explain this syslog message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.acme.com|1695047794|access denied|179.161.131.145|https://shareholders.acme.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Sep 18 14:36:34",
"message": "<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.acme.com|1695047794|access denied|179.161.131.145|https://shareholders.acme.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1695047794",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "179.161.131.145"
} | Create a JSON artifact from the message |
<132>Sep 18 14:36:34 shareholders drupal: https://shareholders.acme.com|1695047794|access denied|179.161.131.145|https://shareholders.acme.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.