input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.81","epkey":"EPB0S2US78NE3VGG2JZ7","flash_version":"uninstalled","hostname":null,"ip":"55.12.116.200","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:54:57.950526+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139697,"txid":"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DULTGTQYZ5HJV791KHVO","name":"bob"}} ::: program=Chrome ::: clientIP=55.12.116.200 ::: userName=bob ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1660139697",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.81\",\"epkey\":\"EPB0S2US78NE3VGG2JZ7\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"55.12.116.200\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@acme.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-08-10T13:54:57.950526+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1660139697,\"txid\":\"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DULTGTQYZ5HJV791KHVO\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=55.12.116.200 ::: userName=bob ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "55.12.116.200",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.81","epkey":"EPB0S2US78NE3VGG2JZ7","flash_version":"uninstalled","hostname":null,"ip":"55.12.116.200","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:54:57.950526+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139697,"txid":"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DULTGTQYZ5HJV791KHVO","name":"bob"}} ::: program=Chrome ::: clientIP=55.12.116.200 ::: userName=bob ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.81","epkey":"EPB0S2US78NE3VGG2JZ7","flash_version":"uninstalled","hostname":null,"ip":"55.12.116.200","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:54:57.950526+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139697,"txid":"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DULTGTQYZ5HJV791KHVO","name":"bob"}} ::: program=Chrome ::: clientIP=55.12.116.200 ::: userName=bob ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1660139697
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
streamName: DUO
clientIP: 55.12.116.200
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.81","epkey":"EPB0S2US78NE3VGG2JZ7","flash_version":"uninstalled","hostname":null,"ip":"51.60.114.23","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@wayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:54:57.950526+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139697,"txid":"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DULTGTQYZ5HJV791KHVO","name":"fish"}} ::: program=Chrome ::: clientIP=51.60.114.23 ::: userName=fish ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1660139697",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.81\",\"epkey\":\"EPB0S2US78NE3VGG2JZ7\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"51.60.114.23\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"fish@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-08-10T13:54:57.950526+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1660139697,\"txid\":\"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DULTGTQYZ5HJV791KHVO\",\"name\":\"fish\"}} ::: program=Chrome ::: clientIP=51.60.114.23 ::: userName=fish ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "51.60.114.23",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.81","epkey":"EPB0S2US78NE3VGG2JZ7","flash_version":"uninstalled","hostname":null,"ip":"51.60.114.23","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@wayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:54:57.950526+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139697,"txid":"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DULTGTQYZ5HJV791KHVO","name":"fish"}} ::: program=Chrome ::: clientIP=51.60.114.23 ::: userName=fish ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.81","epkey":"EPB0S2US78NE3VGG2JZ7","flash_version":"uninstalled","hostname":null,"ip":"51.60.114.23","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@wayne.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:54:57.950526+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139697,"txid":"c0f4b4e9-1e6d-40fb-a4b9-2c7287315ac2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DULTGTQYZ5HJV791KHVO","name":"fish"}} ::: program=Chrome ::: clientIP=51.60.114.23 ::: userName=fish ::: created_at=1660139697 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139697 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1660139697
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
streamName: DUO
clientIP: 51.60.114.23
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPQUK2AH7K487FMLLCKE","flash_version":"uninstalled","hostname":null,"ip":"45.35.33.236","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Alpharetta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"johndoe@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:53:21.193814+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139601,"txid":"e972b2bd-8503-4e89-8973-0cacea4098a0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"johndoe"}} ::: program=Chrome ::: clientIP=45.35.33.236 ::: userName=johndoe ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1660139601",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.134\",\"epkey\":\"EPQUK2AH7K487FMLLCKE\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"45.35.33.236\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Alpharetta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"johndoe@acme.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-08-10T13:53:21.193814+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1660139601,\"txid\":\"e972b2bd-8503-4e89-8973-0cacea4098a0\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8L3BHMXFUYRX4XSZIG\",\"name\":\"johndoe\"}} ::: program=Chrome ::: clientIP=45.35.33.236 ::: userName=johndoe ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "45.35.33.236",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPQUK2AH7K487FMLLCKE","flash_version":"uninstalled","hostname":null,"ip":"45.35.33.236","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Alpharetta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"johndoe@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:53:21.193814+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139601,"txid":"e972b2bd-8503-4e89-8973-0cacea4098a0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"johndoe"}} ::: program=Chrome ::: clientIP=45.35.33.236 ::: userName=johndoe ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPQUK2AH7K487FMLLCKE","flash_version":"uninstalled","hostname":null,"ip":"45.35.33.236","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Alpharetta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"johndoe@acme.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:53:21.193814+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139601,"txid":"e972b2bd-8503-4e89-8973-0cacea4098a0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"johndoe"}} ::: program=Chrome ::: clientIP=45.35.33.236 ::: userName=johndoe ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1660139601
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
streamName: DUO
clientIP: 45.35.33.236
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPQUK2AH7K487FMLLCKE","flash_version":"uninstalled","hostname":null,"ip":"46.93.87.204","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Alpharetta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:53:21.193814+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139601,"txid":"e972b2bd-8503-4e89-8973-0cacea4098a0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"fish"}} ::: program=Chrome ::: clientIP=46.93.87.204 ::: userName=fish ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1660139601",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.134\",\"epkey\":\"EPQUK2AH7K487FMLLCKE\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"46.93.87.204\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Alpharetta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"fish@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2022-08-10T13:53:21.193814+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1660139601,\"txid\":\"e972b2bd-8503-4e89-8973-0cacea4098a0\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8L3BHMXFUYRX4XSZIG\",\"name\":\"fish\"}} ::: program=Chrome ::: clientIP=46.93.87.204 ::: userName=fish ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "46.93.87.204",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPQUK2AH7K487FMLLCKE","flash_version":"uninstalled","hostname":null,"ip":"46.93.87.204","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Alpharetta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:53:21.193814+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139601,"txid":"e972b2bd-8503-4e89-8973-0cacea4098a0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"fish"}} ::: program=Chrome ::: clientIP=46.93.87.204 ::: userName=fish ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPQUK2AH7K487FMLLCKE","flash_version":"uninstalled","hostname":null,"ip":"46.93.87.204","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Alpharetta","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"fish@oscorp.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2022-08-10T13:53:21.193814+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1660139601,"txid":"e972b2bd-8503-4e89-8973-0cacea4098a0","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8L3BHMXFUYRX4XSZIG","name":"fish"}} ::: program=Chrome ::: clientIP=46.93.87.204 ::: userName=fish ::: created_at=1660139601 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1660139601 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1660139601
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
streamName: DUO
clientIP: 46.93.87.204
userName: fish | Explain this syslog message |
<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:76.191.87.114/55300 dst outside:12.200.101.35/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 54443,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:76.191.87.114/55300 dst outside:12.200.101.35/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 55300,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "76.191.87.114",
"serverIP": "12.200.101.35"
} | Create a JSON artifact from the message |
<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:76.191.87.114/55300 dst outside:12.200.101.35/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:76.191.87.114/55300 dst outside:12.200.101.35/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 54443
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 55300
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 76.191.87.114
serverIP: 12.200.101.35 | Explain this syslog message |
<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.234.208.51/55300 dst outside:220.245.179.152/54443 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 54443,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.234.208.51/55300 dst outside:220.245.179.152/54443 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 55300,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "113.234.208.51",
"serverIP": "220.245.179.152"
} | Create a JSON artifact from the message |
<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.234.208.51/55300 dst outside:220.245.179.152/54443 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Apr 15 2023 21:28:25 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.234.208.51/55300 dst outside:220.245.179.152/54443 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 54443
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 55300
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 113.234.208.51
serverIP: 220.245.179.152 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t234.46.60.2\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.46.60.2","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63425,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-14T13:42:39.964Z\",\"agent\":{\"ephemeral_id\":\"fc1df806-8b90-44b2-9111-e6792cc57518\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-14T13:42:40.793Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t234.46.60.2\\n\\tSource Port:\\t\\t63425\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"NORDC-DC-04.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"234.46.60.2\",\"IpPort\":\"63425\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":672,\"thread\":{\"id\":14876}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":310298005,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "310298005",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "234.46.60.2",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t234.46.60.2\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.46.60.2","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t234.46.60.2\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-DC-04.wayne.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.wayne.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"234.46.60.2","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63425
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 310298005
streamName: microsoft-windows-security-auditing
clientIP: 234.46.60.2
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t208.13.17.69\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.13.17.69","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63425,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-14T13:42:39.964Z\",\"agent\":{\"ephemeral_id\":\"fc1df806-8b90-44b2-9111-e6792cc57518\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-14T13:42:40.793Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t208.13.17.69\\n\\tSource Port:\\t\\t63425\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"208.13.17.69\",\"IpPort\":\"63425\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":672,\"thread\":{\"id\":14876}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":310298005,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "310298005",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "208.13.17.69",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t208.13.17.69\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.13.17.69","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t208.13.17.69\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"208.13.17.69","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63425
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 310298005
streamName: microsoft-windows-security-auditing
clientIP: 208.13.17.69
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t41.35.99.101\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"41.35.99.101","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63425,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-14T13:42:39.964Z\",\"agent\":{\"ephemeral_id\":\"fc1df806-8b90-44b2-9111-e6792cc57518\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-14T13:42:40.793Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t41.35.99.101\\n\\tSource Port:\\t\\t63425\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-DC-04.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"41.35.99.101\",\"IpPort\":\"63425\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":672,\"thread\":{\"id\":14876}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":310298005,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "310298005",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "41.35.99.101",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t41.35.99.101\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"41.35.99.101","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t41.35.99.101\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"41.35.99.101","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63425
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 310298005
streamName: microsoft-windows-security-auditing
clientIP: 41.35.99.101
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t213.38.0.54\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.38.0.54","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | {
"action": "Logon",
"clientport": 63425,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-14T13:42:39.964Z\",\"agent\":{\"ephemeral_id\":\"fc1df806-8b90-44b2-9111-e6792cc57518\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-14T13:42:40.793Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-EVTCO\\n\\tSource Network Address:\\t213.38.0.54\\n\\tSource Port:\\t\\t63425\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-DC-04.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"213.38.0.54\",\"IpPort\":\"63425\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-EVTCO\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":672,\"thread\":{\"id\":14876}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":310298005,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "310298005",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "213.38.0.54",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t213.38.0.54\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.38.0.54","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-14T13:42:39.964Z","agent":{"ephemeral_id":"fc1df806-8b90-44b2-9111-e6792cc57518","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-14T13:42:40.793Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-EVTCO\n\tSource Network Address:\t213.38.0.54\n\tSource Port:\t\t63425\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-DC-04.stark.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"213.38.0.54","IpPort":"63425","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-EVTCO"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":672,"thread":{"id":14876}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":310298005,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 63425
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 310298005
streamName: microsoft-windows-security-auditing
clientIP: 213.38.0.54
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t190.131.69.7\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"190.131.69.7","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | {
"action": "Logon",
"clientport": 22297,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-08T14:51:11.810Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-08T14:51:12.796Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t190.131.69.7\\n\\tSource Port:\\t\\t22297\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"190.131.69.7\",\"IpPort\":\"22297\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":17092}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6178620832,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6178620832",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "190.131.69.7",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t190.131.69.7\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"190.131.69.7","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t190.131.69.7\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"190.131.69.7","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 22297
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6178620832
streamName: microsoft-windows-security-auditing
clientIP: 190.131.69.7
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t222.68.185.253\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.68.185.253","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | {
"action": "Logon",
"clientport": 22297,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-08T14:51:11.810Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-08T14:51:12.796Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t222.68.185.253\\n\\tSource Port:\\t\\t22297\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"222.68.185.253\",\"IpPort\":\"22297\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":17092}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6178620832,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6178620832",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "222.68.185.253",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t222.68.185.253\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.68.185.253","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t222.68.185.253\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.68.185.253","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 22297
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6178620832
streamName: microsoft-windows-security-auditing
clientIP: 222.68.185.253
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t165.243.148.57\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"165.243.148.57","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | {
"action": "Logon",
"clientport": 22297,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-08T14:51:11.810Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-08T14:51:12.796Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t165.243.148.57\\n\\tSource Port:\\t\\t22297\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"165.243.148.57\",\"IpPort\":\"22297\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":17092}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6178620832,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6178620832",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "165.243.148.57",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t165.243.148.57\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"165.243.148.57","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t165.243.148.57\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"165.243.148.57","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 22297
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6178620832
streamName: microsoft-windows-security-auditing
clientIP: 165.243.148.57
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t84.34.71.86\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"84.34.71.86","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | {
"action": "Logon",
"clientport": 22297,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-08-08T14:51:11.810Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-08-08T14:51:12.796Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t84.34.71.86\\n\\tSource Port:\\t\\t22297\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"84.34.71.86\",\"IpPort\":\"22297\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":17092}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6178620832,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6178620832",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "84.34.71.86",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t84.34.71.86\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"84.34.71.86","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-08-08T14:51:11.810Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-08-08T14:51:12.796Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t84.34.71.86\n\tSource Port:\t\t22297\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"84.34.71.86","IpPort":"22297","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":17092}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6178620832,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 22297
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6178620832
streamName: microsoft-windows-security-auditing
clientIP: 84.34.71.86
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"21.0.169.56","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=21.0.169.56 ::: clientHostname=SSTEWART-LT3 ::: userName=janedoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@wayneelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"21.0.169.56\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=21.0.169.56 ::: clientHostname=SSTEWART-LT3 ::: userName=janedoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "21.0.169.56",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"21.0.169.56","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=21.0.169.56 ::: clientHostname=SSTEWART-LT3 ::: userName=janedoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"21.0.169.56","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=21.0.169.56 ::: clientHostname=SSTEWART-LT3 ::: userName=janedoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 21.0.169.56
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientIP=179.210.161.68 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"179.210.161.68","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: clientIP=179.210.161.68 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"johndoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"179.210.161.68\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"}",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "179.210.161.68",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientIP=179.210.161.68 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"179.210.161.68","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientIP=179.210.161.68 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"179.210.161.68","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 179.210.161.68
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"230.22.146.153","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=230.22.146.153 ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"johndoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@starkelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"230.22.146.153\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=230.22.146.153 ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "230.22.146.153",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"230.22.146.153","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=230.22.146.153 ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"230.22.146.153","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=230.22.146.153 ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 230.22.146.153
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"138.67.142.28","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=138.67.142.28 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: userName=fish ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"filename": "pwsh.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe",
"message": "WitFoo-Artifact ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"138.67.142.28\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=138.67.142.28 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe ::: userName=fish ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "138.67.142.28",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"138.67.142.28","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=138.67.142.28 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: userName=fish ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"138.67.142.28","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=138.67.142.28 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: userName=fish ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60
filename: pwsh.exe
filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 138.67.142.28
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: clientMAC=00-15-5d-26-72-11 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"234.248.25.112","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientIP=234.248.25.112 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: clientMAC=00-15-5d-26-72-11 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"johndoe\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"johndoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"234.248.25.112\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: messageType=endpoint_protection_event ::: clientIP=234.248.25.112 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "234.248.25.112",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: clientMAC=00-15-5d-26-72-11 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"234.248.25.112","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientIP=234.248.25.112 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=johndoe ::: clientMAC=00-15-5d-26-72-11 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"johndoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"234.248.25.112","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientIP=234.248.25.112 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 234.248.25.112
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"charlie","last_seen":"2024-05-10T15:27:29Z","local_ip":"148.124.243.130","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientIP=148.124.243.130 ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Coscorpe\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: clientMAC=00-ff-c8-e9-2f-db ::: fileName=triPOS Setup.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-ff-c8-e9-2f-db",
"filehash": "978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b",
"filename": "triPOS Setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\ProgramData\\Package Cache\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe",
"message": "WitFoo-Artifact ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: userName=charlie ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"458\",\"cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776\",\"confidence\":60,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"filename\":\"triPOS Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"6468e92d1ad408df05df38c1192de790\",\"objective\":\"Follow Through\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.clean.room=\\\"C:\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall\",\"parent_md5\":\"6468e92d1ad408df05df38c1192de790\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295\",\"parent_sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":true,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"ransomware\",\"severity\":50,\"sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"timestamp\":\"2024-05-10T15:46:45Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-05-10T15:46:52.112770748Z\",\"date_updated\":\"2024-05-10T15:46:56Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-05-08T23:47:06.818Z\",\"agent_version\":\"7.13.18308.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18308\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"75.231.140.51\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-05-09T03:50:36Z\",\"last_login_user\":\"charlie\",\"last_seen\":\"2024-05-10T15:27:29Z\",\"local_ip\":\"148.124.243.130\",\"mac_address\":\"00-ff-c8-e9-2f-db\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-05-10T15:29:07Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-05-10T15:46:45Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-05-10T15:46:45Z\",\"max_confidence\":60,\"max_severity\":50,\"max_severity_displayname\":\"Medium\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientIP=148.124.243.130 ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe ::: clientMAC=00-ff-c8-e9-2f-db ::: fileName=triPOS Setup.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "148.124.243.130",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"charlie","last_seen":"2024-05-10T15:27:29Z","local_ip":"148.124.243.130","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientIP=148.124.243.130 ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Coscorpe\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: clientMAC=00-ff-c8-e9-2f-db ::: fileName=triPOS Setup.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"charlie","last_seen":"2024-05-10T15:27:29Z","local_ip":"148.124.243.130","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientIP=148.124.243.130 ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Coscorpe\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: clientMAC=00-ff-c8-e9-2f-db ::: fileName=triPOS Setup.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-ff-c8-e9-2f-db
filehash: 978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b
filename: triPOS Setup.exe
filepath: \Device\HarddiskVolume3\ProgramData\Package Cache\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 148.124.243.130
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: userName=charlie ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientIP=81.46.1.222 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"81.46.1.222","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: userName=charlie ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: clientIP=81.46.1.222 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"81.46.1.222\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"}",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "81.46.1.222",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=charlie ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientIP=81.46.1.222 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"81.46.1.222","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=charlie ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientIP=81.46.1.222 ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: messageType=endpoint_protection_event ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"81.46.1.222","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 81.46.1.222
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"254.59.171.57","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=254.59.171.57 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: userName=charlie ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"filename": "pwsh.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe",
"message": "WitFoo-Artifact ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@wayneelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"254.59.171.57\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=254.59.171.57 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe ::: userName=charlie ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "254.59.171.57",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"254.59.171.57","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=254.59.171.57 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: userName=charlie ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"254.59.171.57","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=pwsh.exe ::: program=crowdstrike_falcon ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=254.59.171.57 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: userName=charlie ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60
filename: pwsh.exe
filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 254.59.171.57
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: clientMAC=00-15-5d-26-72-11 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"9.7.224.36","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientIP=9.7.224.36 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: clientMAC=00-15-5d-26-72-11 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"9.7.224.36\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: messageType=endpoint_protection_event ::: clientIP=9.7.224.36 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "9.7.224.36",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: clientMAC=00-15-5d-26-72-11 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"9.7.224.36","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientIP=9.7.224.36 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: fileName=explorer.exe ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: clientMAC=00-15-5d-26-72-11 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"9.7.224.36","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientIP=9.7.224.36 ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 9.7.224.36
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=124.130.171.132 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"124.130.171.132","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe | {
"clienthostname": "JBETRO-LT4",
"clientmac": "00-ff-c0-d6-f8-46",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=124.130.171.132 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\Windows\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T09:06:08Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T09:06:17.051656144Z\",\"date_updated\":\"2024-07-19T09:06:24Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2024-07-17T07:18:20.541Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-07-19T05:29:58Z\",\"last_login_user\":\"janedoe\",\"last_seen\":\"2024-07-19T08:47:56Z\",\"local_ip\":\"124.130.171.132\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T08:48:28Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T09:06:08Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T09:06:08Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "124.130.171.132",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=124.130.171.132 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"124.130.171.132","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=124.130.171.132 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"124.130.171.132","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4
clientmac: 00-ff-c0-d6-f8-46
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 124.130.171.132
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=186.30.226.53 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"186.30.226.53","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe | {
"clienthostname": "JBETRO-LT4",
"clientmac": "00-ff-c0-d6-f8-46",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=186.30.226.53 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\Windows\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T09:06:08Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T09:06:17.051656144Z\",\"date_updated\":\"2024-07-19T09:06:24Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2024-07-17T07:18:20.541Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-07-19T05:29:58Z\",\"last_login_user\":\"janedoe\",\"last_seen\":\"2024-07-19T08:47:56Z\",\"local_ip\":\"186.30.226.53\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T08:48:28Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T09:06:08Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T09:06:08Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "186.30.226.53",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=186.30.226.53 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"186.30.226.53","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: fileName=explorer.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientIP=186.30.226.53 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"186.30.226.53","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: clientHostname=JBETRO-LT4 ::: userName=janedoe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4
clientmac: 00-ff-c0-d6-f8-46
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 186.30.226.53
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: clientHostname=JBETRO-LT4 ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: program=crowdstrike_falcon ::: clientIP=182.9.57.24 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4959m -classpath \"zap-2.14.0.jar\" org.zaproxy.zap.ZAP","confidence":100,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"Detect OnWrite Adware/PUP Hash","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","ioc_source":"file_write","ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files\\ZAP\\Zed Attack Proxy\\ZAP.exe\" ","parent_md5":"4bf8d9dff4936e44dbde2f3227a17064","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711","parent_sha256":"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2024-06-14T12:05:32Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"alice"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-06-14T12:05:39.498264764Z","date_updated":"2024-06-14T12:05:45Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396","device":{"agent_load_flags":"1","agent_local_time":"2024-06-12T16:01:53.360Z","agent_version":"7.15.18511.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18511","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-06-14T11:27:09Z","last_login_user":"alice","last_seen":"2024-06-14T11:51:08Z","local_ip":"182.9.57.24","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-06-14T11:51:17Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-06-14T12:05:32Z","hostinfo":{"domain":""},"last_behavior":"2024-06-14T12:05:32Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: userName=alice ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe | {
"clienthostname": "JBETRO-LT4",
"clientmac": "00-ff-c0-d6-f8-46",
"filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851",
"filename": "javaw.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe",
"message": "WitFoo-Artifact ::: clientHostname=JBETRO-LT4 ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: program=crowdstrike_falcon ::: clientIP=182.9.57.24 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: streamName=Crowdstrike Detection ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4959m -classpath \\\"zap-2.14.0.jar\\\" org.zaproxy.zap.ZAP\",\"confidence\":100,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\alice\\\\ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"ioc_source\":\"file_write\",\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\ZAP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_md5\":\"4bf8d9dff4936e44dbde2f3227a17064\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711\",\"parent_sha256\":\"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2024-06-14T12:05:32Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-06-14T12:05:39.498264764Z\",\"date_updated\":\"2024-06-14T12:05:45Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-06-12T16:01:53.360Z\",\"agent_version\":\"7.15.18511.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18511\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-06-14T11:27:09Z\",\"last_login_user\":\"alice\",\"last_seen\":\"2024-06-14T11:51:08Z\",\"local_ip\":\"182.9.57.24\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-06-14T11:51:17Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-06-14T12:05:32Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-06-14T12:05:32Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: userName=alice ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "182.9.57.24",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: clientHostname=JBETRO-LT4 ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: program=crowdstrike_falcon ::: clientIP=182.9.57.24 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4959m -classpath \"zap-2.14.0.jar\" org.zaproxy.zap.ZAP","confidence":100,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"Detect OnWrite Adware/PUP Hash","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","ioc_source":"file_write","ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files\\ZAP\\Zed Attack Proxy\\ZAP.exe\" ","parent_md5":"4bf8d9dff4936e44dbde2f3227a17064","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711","parent_sha256":"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2024-06-14T12:05:32Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"alice"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-06-14T12:05:39.498264764Z","date_updated":"2024-06-14T12:05:45Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396","device":{"agent_load_flags":"1","agent_local_time":"2024-06-12T16:01:53.360Z","agent_version":"7.15.18511.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18511","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-06-14T11:27:09Z","last_login_user":"alice","last_seen":"2024-06-14T11:51:08Z","local_ip":"182.9.57.24","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-06-14T11:51:17Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-06-14T12:05:32Z","hostinfo":{"domain":""},"last_behavior":"2024-06-14T12:05:32Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: userName=alice ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: clientHostname=JBETRO-LT4 ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: program=crowdstrike_falcon ::: clientIP=182.9.57.24 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4959m -classpath \"zap-2.14.0.jar\" org.zaproxy.zap.ZAP","confidence":100,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"Detect OnWrite Adware/PUP Hash","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","ioc_source":"file_write","ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files\\ZAP\\Zed Attack Proxy\\ZAP.exe\" ","parent_md5":"4bf8d9dff4936e44dbde2f3227a17064","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711","parent_sha256":"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2024-06-14T12:05:32Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"alice"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-06-14T12:05:39.498264764Z","date_updated":"2024-06-14T12:05:45Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396","device":{"agent_load_flags":"1","agent_local_time":"2024-06-12T16:01:53.360Z","agent_version":"7.15.18511.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18511","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-06-14T11:27:09Z","last_login_user":"alice","last_seen":"2024-06-14T11:51:08Z","local_ip":"182.9.57.24","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-06-14T11:51:17Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-06-14T12:05:32Z","hostinfo":{"domain":""},"last_behavior":"2024-06-14T12:05:32Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-ff-c0-d6-f8-46 ::: userName=alice ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4
clientmac: 00-ff-c0-d6-f8-46
filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
filename: javaw.exe
filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 182.9.57.24
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Bewayne","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"janedoe","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"janedoe","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"125.235.222.24","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"125.235.222.24","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=125.235.222.24 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Zina Robinson | Newport\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:43.000Z\",\"activated\":\"2022-09-27T14:53:44.000Z\",\"statusChanged\":\"2023-05-17T15:22:01.000Z\",\"lastLogin\":\"2023-07-18T00:50:36.000Z\",\"lastUpdated\":\"2023-05-17T15:22:01.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Robinson\",\"zipCode\":\"92260\",\"city\":\"Newport Bewayne\",\"displayName\":\"Zina Robinson\",\"secondEmail\":null,\"title\":\"Chief People Officer\",\"login\":\"janedoe\",\"firstName\":\"Zina\",\"immutableID\":\"HizFj77USE+yN8ADEug1FA==\",\"mobilePhone\":null,\"streetAddress\":\"4675 MacArthur Court, Ste 1450\",\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Newport\",\"email\":\"janedoe\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"type\":\"User\",\"alternateId\":\"janedoe\",\"displayName\":\"Zina Robinson\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"125.235.222.24\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxuQTm1sd7Rimxiti8GhOFRg\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-07-18T00:50:18.525Z\",\"securityContext\":{\"asNumber\":7018,\"asOrg\":\"at&t corp.\",\"isp\":\"att services inc\",\"domain\":\"sbcglobal.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZLXhukKDp1gzJo374ha48QAACLM\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"behaviors\":\"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}\",\"requestId\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"dtHash\":\"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e\",\"risk\":\"{level=LOW}\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"detail\":{}},\"uuid\":\"10fe9d81-2505-11ee-bb8a-ab6ea655003e\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"125.235.222.24\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevatzOAKtSO0r696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=125.235.222.24 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"auth_failure",
"userDisplay=Zina Robinson | Newport"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "125.235.222.24",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Bewayne","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"janedoe","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"janedoe","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"125.235.222.24","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"125.235.222.24","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=125.235.222.24 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Bewayne","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"janedoe","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"janedoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"janedoe","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"125.235.222.24","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"125.235.222.24","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=125.235.222.24 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'auth_failure', 'userDisplay=Zina Robinson | Newport']
vendorcode: user.session.start
streamName: Okta
clientIP: 125.235.222.24
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Bewayne","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"bob","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"bob","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"138.204.95.164","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"138.204.95.164","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=138.204.95.164 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Zina Robinson | Newport\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:43.000Z\",\"activated\":\"2022-09-27T14:53:44.000Z\",\"statusChanged\":\"2023-05-17T15:22:01.000Z\",\"lastLogin\":\"2023-07-18T00:50:36.000Z\",\"lastUpdated\":\"2023-05-17T15:22:01.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Robinson\",\"zipCode\":\"92260\",\"city\":\"Newport Bewayne\",\"displayName\":\"Zina Robinson\",\"secondEmail\":null,\"title\":\"Chief People Officer\",\"login\":\"bob\",\"firstName\":\"Zina\",\"immutableID\":\"HizFj77USE+yN8ADEug1FA==\",\"mobilePhone\":null,\"streetAddress\":\"4675 MacArthur Court, Ste 1450\",\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Newport\",\"email\":\"bob\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"type\":\"User\",\"alternateId\":\"bob\",\"displayName\":\"Zina Robinson\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"138.204.95.164\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxuQTm1sd7Rimxiti8GhOFRg\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-07-18T00:50:18.525Z\",\"securityContext\":{\"asNumber\":7018,\"asOrg\":\"at&t corp.\",\"isp\":\"att services inc\",\"domain\":\"sbcglobal.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZLXhukKDp1gzJo374ha48QAACLM\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"behaviors\":\"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}\",\"requestId\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"dtHash\":\"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e\",\"risk\":\"{level=LOW}\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"detail\":{}},\"uuid\":\"10fe9d81-2505-11ee-bb8a-ab6ea655003e\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"138.204.95.164\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevatzOAKtSO0r696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=138.204.95.164 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"auth_failure",
"userDisplay=Zina Robinson | Newport"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "138.204.95.164",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Bewayne","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"bob","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"bob","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"138.204.95.164","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"138.204.95.164","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=138.204.95.164 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Bewayne","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"bob","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"bob","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"138.204.95.164","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"138.204.95.164","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=138.204.95.164 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'auth_failure', 'userDisplay=Zina Robinson | Newport']
vendorcode: user.session.start
streamName: Okta
clientIP: 138.204.95.164
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Beumbrella","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"nighthawk","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"nighthawk","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"164.143.148.0","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"164.143.148.0","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=164.143.148.0 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Zina Robinson | Newport\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:43.000Z\",\"activated\":\"2022-09-27T14:53:44.000Z\",\"statusChanged\":\"2023-05-17T15:22:01.000Z\",\"lastLogin\":\"2023-07-18T00:50:36.000Z\",\"lastUpdated\":\"2023-05-17T15:22:01.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Robinson\",\"zipCode\":\"92260\",\"city\":\"Newport Beumbrella\",\"displayName\":\"Zina Robinson\",\"secondEmail\":null,\"title\":\"Chief People Officer\",\"login\":\"nighthawk\",\"firstName\":\"Zina\",\"immutableID\":\"HizFj77USE+yN8ADEug1FA==\",\"mobilePhone\":null,\"streetAddress\":\"4675 MacArthur Court, Ste 1450\",\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Newport\",\"email\":\"nighthawk\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"Zina Robinson\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"164.143.148.0\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxuQTm1sd7Rimxiti8GhOFRg\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-07-18T00:50:18.525Z\",\"securityContext\":{\"asNumber\":7018,\"asOrg\":\"at&t corp.\",\"isp\":\"att services inc\",\"domain\":\"sbcglobal.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZLXhukKDp1gzJo374ha48QAACLM\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"behaviors\":\"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}\",\"requestId\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"dtHash\":\"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e\",\"risk\":\"{level=LOW}\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"detail\":{}},\"uuid\":\"10fe9d81-2505-11ee-bb8a-ab6ea655003e\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"164.143.148.0\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevatzOAKtSO0r696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=164.143.148.0 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"auth_failure",
"userDisplay=Zina Robinson | Newport"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "164.143.148.0",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Beumbrella","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"nighthawk","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"nighthawk","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"164.143.148.0","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"164.143.148.0","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=164.143.148.0 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Beumbrella","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"nighthawk","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"nighthawk","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"164.143.148.0","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"164.143.148.0","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=164.143.148.0 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'auth_failure', 'userDisplay=Zina Robinson | Newport']
vendorcode: user.session.start
streamName: Okta
clientIP: 164.143.148.0
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Beoscorp","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"fish","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"fish","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"183.100.122.35","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"183.100.122.35","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=183.100.122.35 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User login to Okta\",\"userDisplay=Zina Robinson | Newport\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"status\":\"ACTIVE\",\"created\":\"2022-09-27T14:53:43.000Z\",\"activated\":\"2022-09-27T14:53:44.000Z\",\"statusChanged\":\"2023-05-17T15:22:01.000Z\",\"lastLogin\":\"2023-07-18T00:50:36.000Z\",\"lastUpdated\":\"2023-05-17T15:22:01.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"lastName\":\"Robinson\",\"zipCode\":\"92260\",\"city\":\"Newport Beoscorp\",\"displayName\":\"Zina Robinson\",\"secondEmail\":null,\"title\":\"Chief People Officer\",\"login\":\"fish\",\"firstName\":\"Zina\",\"immutableID\":\"HizFj77USE+yN8ADEug1FA==\",\"mobilePhone\":null,\"streetAddress\":\"4675 MacArthur Court, Ste 1450\",\"countryCode\":\"US\",\"state\":\"CA\",\"department\":\"Newport\",\"email\":\"fish\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u2jhxsi66Ar6SBm697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"Zina Robinson\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko\",\"os\":\"Windows 8\",\"browser\":\"IE11\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":null,\"ipAddress\":\"183.100.122.35\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxuQTm1sd7Rimxiti8GhOFRg\"},\"displayMessage\":\"User login to Okta\",\"eventType\":\"user.session.start\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"INVALID_CREDENTIALS\"},\"published\":\"2023-07-18T00:50:18.525Z\",\"securityContext\":{\"asNumber\":7018,\"asOrg\":\"at&t corp.\",\"isp\":\"att services inc\",\"domain\":\"sbcglobal.net\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZLXhukKDp1gzJo374ha48QAACLM\",\"deviceFingerprint\":\"9beff0acfec08b61e5955b8d7f792041\",\"behaviors\":\"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}\",\"requestId\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"dtHash\":\"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e\",\"risk\":\"{level=LOW}\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"core.user_auth.login_failed\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZLXhyY9cHSuE9VdOUm_r7wAADIM\",\"detail\":{}},\"uuid\":\"10fe9d81-2505-11ee-bb8a-ab6ea655003e\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"183.100.122.35\",\"geographicalContext\":{\"city\":\"Orange\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92869\",\"geolocation\":{\"lat\":33.7854,\"lon\":-117.7948}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"laeaevatzOAKtSO0r696\",\"type\":\"AuthenticatorEnrollment\",\"alternateId\":\"unknown\",\"displayName\":\"Password\",\"detailEntry\":null},{\"id\":\"0oa29uf7l9ectzUsK697\",\"type\":\"AppInstance\",\"alternateId\":\"Palo Alto Networks - GlobalProtect\",\"displayName\":\"Palo Alto Networks - GlobalProtect\",\"detailEntry\":null}]}} ::: program=IE11 ::: clientIP=183.100.122.35 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "IE11",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=User login to Okta",
"auth_failure",
"userDisplay=Zina Robinson | Newport"
],
"vendorcode": "user.session.start",
"streamName": "Okta",
"clientIP": "183.100.122.35",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Beoscorp","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"fish","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"fish","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"183.100.122.35","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"183.100.122.35","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=183.100.122.35 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User login to Okta","userDisplay=Zina Robinson | Newport","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u2jhxsi66Ar6SBm697","status":"ACTIVE","created":"2022-09-27T14:53:43.000Z","activated":"2022-09-27T14:53:44.000Z","statusChanged":"2023-05-17T15:22:01.000Z","lastLogin":"2023-07-18T00:50:36.000Z","lastUpdated":"2023-05-17T15:22:01.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"lastName":"Robinson","zipCode":"92260","city":"Newport Beoscorp","displayName":"Zina Robinson","secondEmail":null,"title":"Chief People Officer","login":"fish","firstName":"Zina","immutableID":"HizFj77USE+yN8ADEug1FA==","mobilePhone":null,"streetAddress":"4675 MacArthur Court, Ste 1450","countryCode":"US","state":"CA","department":"Newport","email":"fish"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u2jhxsi66Ar6SBm697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u2jhxsi66Ar6SBm697","type":"User","alternateId":"fish","displayName":"Zina Robinson","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (Windows NT 6.2; Win64; x64; Trident/7.0; rv:11.0) like Gecko","os":"Windows 8","browser":"IE11"},"zone":"null","device":"Computer","id":null,"ipAddress":"183.100.122.35","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxuQTm1sd7Rimxiti8GhOFRg"},"displayMessage":"User login to Okta","eventType":"user.session.start","outcome":{"result":"FAILURE","reason":"INVALID_CREDENTIALS"},"published":"2023-07-18T00:50:18.525Z","securityContext":{"asNumber":7018,"asOrg":"at&t corp.","isp":"att services inc","domain":"sbcglobal.net","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZLXhukKDp1gzJo374ha48QAACLM","deviceFingerprint":"9beff0acfec08b61e5955b8d7f792041","behaviors":"{New Geo-Location=NEGATIVE, New Device=NEGATIVE, New IP=NEGATIVE, New State=NEGATIVE, New Country=NEGATIVE, Velocity=NEGATIVE, New City=NEGATIVE}","requestId":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","dtHash":"043e49014b7d8bb6e5356d8b80df3b8a92a2898f2d5aa9d898ab0698a260a52e","risk":"{level=LOW}","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"core.user_auth.login_failed","transaction":{"type":"WEB","id":"ZLXhyY9cHSuE9VdOUm_r7wAADIM","detail":{}},"uuid":"10fe9d81-2505-11ee-bb8a-ab6ea655003e","version":"0","request":{"ipChain":[{"ip":"183.100.122.35","geographicalContext":{"city":"Orange","state":"California","country":"United States","postalCode":"92869","geolocation":{"lat":33.7854,"lon":-117.7948}},"version":"V4","source":null}]},"target":[{"id":"laeaevatzOAKtSO0r696","type":"AuthenticatorEnrollment","alternateId":"unknown","displayName":"Password","detailEntry":null},{"id":"0oa29uf7l9ectzUsK697","type":"AppInstance","alternateId":"Palo Alto Networks - GlobalProtect","displayName":"Palo Alto Networks - GlobalProtect","detailEntry":null}]}} ::: program=IE11 ::: clientIP=183.100.122.35 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-07-18T00:50:18.525Z ::: streamName=Okta ::: vendorCode=user.session.start ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: IE11
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=User login to Okta', 'auth_failure', 'userDisplay=Zina Robinson | Newport']
vendorcode: user.session.start
streamName: Okta
clientIP: 183.100.122.35
userName: fish | Explain this syslog message |
<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:166.133.122.51/54643 dst outside:141.97.249.143/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:166.133.122.51/54643 dst outside:141.97.249.143/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54643,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "166.133.122.51",
"serverIP": "141.97.249.143"
} | Create a JSON artifact from the message |
<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:166.133.122.51/54643 dst outside:141.97.249.143/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:166.133.122.51/54643 dst outside:141.97.249.143/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54643
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 166.133.122.51
serverIP: 141.97.249.143 | Explain this syslog message |
<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:74.185.159.189/54643 dst outside:204.115.171.158/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:74.185.159.189/54643 dst outside:204.115.171.158/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54643,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "74.185.159.189",
"serverIP": "204.115.171.158"
} | Create a JSON artifact from the message |
<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:74.185.159.189/54643 dst outside:204.115.171.158/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 18 2023 12:57:01 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:74.185.159.189/54643 dst outside:204.115.171.158/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54643
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 74.185.159.189
serverIP: 204.115.171.158 | Explain this syslog message |
<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.96.11.37/62367 dst outside:214.181.89.110/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.96.11.37/62367 dst outside:214.181.89.110/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 62367,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "170.96.11.37",
"serverIP": "214.181.89.110"
} | Create a JSON artifact from the message |
<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.96.11.37/62367 dst outside:214.181.89.110/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:170.96.11.37/62367 dst outside:214.181.89.110/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 62367
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 170.96.11.37
serverIP: 214.181.89.110 | Explain this syslog message |
<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:37.245.124.17/62367 dst outside:254.130.57.191/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 18 2023 12:56:58 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:37.245.124.17/62367 dst outside:254.130.57.191/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 62367,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "37.245.124.17",
"serverIP": "254.130.57.191"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.