input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.acme.com|1693478629|access denied|170.22.228.134|https://shareholders.acme.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 31 10:43:49", "message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.acme.com|1693478629|access denied|170.22.228.134|https://shareholders.acme.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1693478629", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "170.22.228.134" }
Create a JSON artifact from the message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.acme.com|1693478629|access denied|170.22.228.134|https://shareholders.acme.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.acme.com|1693478629|access denied|170.22.228.134|https://shareholders.acme.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 31 10:43:49 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1693478629 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 170.22.228.134
Explain this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|107.157.124.81|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 31 10:43:49", "message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|107.157.124.81|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1693478629", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "107.157.124.81" }
Create a JSON artifact from the message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|107.157.124.81|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|107.157.124.81|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 31 10:43:49 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1693478629 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 107.157.124.81
Explain this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|172.241.43.210|https://shareholders.stark.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 31 10:43:49", "message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|172.241.43.210|https://shareholders.stark.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1693478629", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "172.241.43.210" }
Create a JSON artifact from the message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|172.241.43.210|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|172.241.43.210|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 31 10:43:49 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1693478629 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 172.241.43.210
Explain this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|199.168.177.219|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 31 10:43:49", "message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|199.168.177.219|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1693478629", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "199.168.177.219" }
Create a JSON artifact from the message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|199.168.177.219|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.wayne.com|1693478629|access denied|199.168.177.219|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 31 10:43:49 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1693478629 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 199.168.177.219
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t216.11.111.36\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"216.11.111.36","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
{ "action": "Logon", "clientport": 3524, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:57.557Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:59.081Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t216.11.111.36\\n\\tSource Port:\\t\\t3524\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-APP-SMTP.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"216.11.111.36\",\"IpPort\":\"3524\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310948,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310948", "streamName": "microsoft-windows-security-auditing", "clientIP": "216.11.111.36", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t216.11.111.36\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"216.11.111.36","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t216.11.111.36\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"216.11.111.36","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3524 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310948 streamName: microsoft-windows-security-auditing clientIP: 216.11.111.36 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t205.7.58.85\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"205.7.58.85","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
{ "action": "Logon", "clientport": 3524, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:57.557Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:59.081Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t205.7.58.85\\n\\tSource Port:\\t\\t3524\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-APP-SMTP.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"205.7.58.85\",\"IpPort\":\"3524\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310948,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310948", "streamName": "microsoft-windows-security-auditing", "clientIP": "205.7.58.85", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t205.7.58.85\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"205.7.58.85","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t205.7.58.85\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"205.7.58.85","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3524 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310948 streamName: microsoft-windows-security-auditing clientIP: 205.7.58.85 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t237.132.229.194\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"237.132.229.194","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
{ "action": "Logon", "clientport": 3168, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:55.561Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:57.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t237.132.229.194\\n\\tSource Port:\\t\\t3168\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-APP-SMTP.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"237.132.229.194\",\"IpPort\":\"3168\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310896,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310896", "streamName": "microsoft-windows-security-auditing", "clientIP": "237.132.229.194", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t237.132.229.194\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"237.132.229.194","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t237.132.229.194\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"237.132.229.194","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3168 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310896 streamName: microsoft-windows-security-auditing clientIP: 237.132.229.194 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t176.109.46.57\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"176.109.46.57","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
{ "action": "Logon", "clientport": 3168, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:55.561Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:57.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t176.109.46.57\\n\\tSource Port:\\t\\t3168\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-APP-SMTP.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"176.109.46.57\",\"IpPort\":\"3168\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310896,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310896", "streamName": "microsoft-windows-security-auditing", "clientIP": "176.109.46.57", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t176.109.46.57\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"176.109.46.57","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t176.109.46.57\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"176.109.46.57","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3168 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310896 streamName: microsoft-windows-security-auditing clientIP: 176.109.46.57 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t211.141.155.42\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"211.141.155.42","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
{ "action": "Logon", "clientport": 3102, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:54.504Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:56.000Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t211.141.155.42\\n\\tSource Port:\\t\\t3102\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-APP-SMTP.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"211.141.155.42\",\"IpPort\":\"3102\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310877,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310877", "streamName": "microsoft-windows-security-auditing", "clientIP": "211.141.155.42", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t211.141.155.42\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"211.141.155.42","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t211.141.155.42\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"211.141.155.42","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3102 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310877 streamName: microsoft-windows-security-auditing clientIP: 211.141.155.42 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t164.201.14.157\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"164.201.14.157","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
{ "action": "Logon", "clientport": 3102, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:54.504Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:56.000Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t164.201.14.157\\n\\tSource Port:\\t\\t3102\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-APP-SMTP.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"164.201.14.157\",\"IpPort\":\"3102\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310877,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310877", "streamName": "microsoft-windows-security-auditing", "clientIP": "164.201.14.157", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t164.201.14.157\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"164.201.14.157","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t164.201.14.157\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"164.201.14.157","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3102 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310877 streamName: microsoft-windows-security-auditing clientIP: 164.201.14.157 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t215.59.94.194\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"215.59.94.194","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
{ "action": "Logon", "clientport": 51764, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:44.316Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:44.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t215.59.94.194\\n\\tSource Port:\\t\\t51764\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-APP-SMTP.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"215.59.94.194\",\"IpPort\":\"51764\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310762,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310762", "streamName": "microsoft-windows-security-auditing", "clientIP": "215.59.94.194", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t215.59.94.194\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"215.59.94.194","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t215.59.94.194\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"215.59.94.194","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51764 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310762 streamName: microsoft-windows-security-auditing clientIP: 215.59.94.194 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t83.31.146.175\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"83.31.146.175","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
{ "action": "Logon", "clientport": 51764, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:44.316Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:44.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t83.31.146.175\\n\\tSource Port:\\t\\t51764\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-APP-SMTP.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"83.31.146.175\",\"IpPort\":\"51764\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310762,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310762", "streamName": "microsoft-windows-security-auditing", "clientIP": "83.31.146.175", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t83.31.146.175\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"83.31.146.175","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t83.31.146.175\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"83.31.146.175","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51764 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310762 streamName: microsoft-windows-security-auditing clientIP: 83.31.146.175 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t192.73.0.159\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"192.73.0.159","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
{ "action": "Logon", "clientport": 3524, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:57.557Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:59.081Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t192.73.0.159\\n\\tSource Port:\\t\\t3524\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-APP-SMTP.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"192.73.0.159\",\"IpPort\":\"3524\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310948,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310948", "streamName": "microsoft-windows-security-auditing", "clientIP": "192.73.0.159", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t192.73.0.159\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"192.73.0.159","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t192.73.0.159\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-APP-SMTP.acme.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"192.73.0.159","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3524 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310948 streamName: microsoft-windows-security-auditing clientIP: 192.73.0.159 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t133.191.59.157\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-APP-SMTP.wayne.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.wayne.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"133.191.59.157","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
{ "action": "Logon", "clientport": 3524, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:57.557Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:59.081Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.wayne.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t133.191.59.157\\n\\tSource Port:\\t\\t3524\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"NORDC-APP-SMTP.wayne.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.wayne.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"133.191.59.157\",\"IpPort\":\"3524\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310948,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310948", "streamName": "microsoft-windows-security-auditing", "clientIP": "133.191.59.157", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t133.191.59.157\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-APP-SMTP.wayne.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.wayne.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"133.191.59.157","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:57.557Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:59.081Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.wayne.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t133.191.59.157\n\tSource Port:\t\t3524\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"NORDC-APP-SMTP.wayne.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.wayne.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"133.191.59.157","IpPort":"3524","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310948,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3524 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310948 streamName: microsoft-windows-security-auditing clientIP: 133.191.59.157 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t232.145.51.21\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"232.145.51.21","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
{ "action": "Logon", "clientport": 3168, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:55.561Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:57.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t232.145.51.21\\n\\tSource Port:\\t\\t3168\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-APP-SMTP.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"232.145.51.21\",\"IpPort\":\"3168\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310896,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310896", "streamName": "microsoft-windows-security-auditing", "clientIP": "232.145.51.21", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t232.145.51.21\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"232.145.51.21","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t232.145.51.21\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"232.145.51.21","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3168 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310896 streamName: microsoft-windows-security-auditing clientIP: 232.145.51.21 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t68.107.221.121\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"68.107.221.121","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
{ "action": "Logon", "clientport": 3168, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:55.561Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:57.032Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t68.107.221.121\\n\\tSource Port:\\t\\t3168\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-APP-SMTP.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"68.107.221.121\",\"IpPort\":\"3168\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310896,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310896", "streamName": "microsoft-windows-security-auditing", "clientIP": "68.107.221.121", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t68.107.221.121\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"68.107.221.121","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:55.561Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:57.032Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t68.107.221.121\n\tSource Port:\t\t3168\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"68.107.221.121","IpPort":"3168","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310896,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3168 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310896 streamName: microsoft-windows-security-auditing clientIP: 68.107.221.121 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t40.13.129.149\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"40.13.129.149","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
{ "action": "Logon", "clientport": 3102, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:54.504Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:56.000Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t40.13.129.149\\n\\tSource Port:\\t\\t3102\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-APP-SMTP.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"40.13.129.149\",\"IpPort\":\"3102\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310877,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310877", "streamName": "microsoft-windows-security-auditing", "clientIP": "40.13.129.149", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t40.13.129.149\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"40.13.129.149","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t40.13.129.149\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-APP-SMTP.oscorp.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.oscorp.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"40.13.129.149","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3102 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310877 streamName: microsoft-windows-security-auditing clientIP: 40.13.129.149 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t182.175.26.64\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"182.175.26.64","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
{ "action": "Logon", "clientport": 3102, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:54.504Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:56.000Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t182.175.26.64\\n\\tSource Port:\\t\\t3102\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-APP-SMTP.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"182.175.26.64\",\"IpPort\":\"3102\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3040}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310877,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310877", "streamName": "microsoft-windows-security-auditing", "clientIP": "182.175.26.64", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t182.175.26.64\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"182.175.26.64","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:54.504Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:56.000Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t182.175.26.64\n\tSource Port:\t\t3102\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"182.175.26.64","IpPort":"3102","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3040}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310877,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 3102 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310877 streamName: microsoft-windows-security-auditing clientIP: 182.175.26.64 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t206.249.255.22\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"206.249.255.22","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
{ "action": "Logon", "clientport": 51764, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:44.316Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:44.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t206.249.255.22\\n\\tSource Port:\\t\\t51764\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-APP-SMTP.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"206.249.255.22\",\"IpPort\":\"51764\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310762,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310762", "streamName": "microsoft-windows-security-auditing", "clientIP": "206.249.255.22", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t206.249.255.22\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"206.249.255.22","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t206.249.255.22\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-APP-SMTP.umbrella.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"206.249.255.22","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51764 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310762 streamName: microsoft-windows-security-auditing clientIP: 206.249.255.22 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t34.144.114.37\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"34.144.114.37","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
{ "action": "Logon", "clientport": 51764, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-10-19T09:05:44.316Z\",\"agent\":{\"ephemeral_id\":\"2e7ed087-cdf9-47f4-82a4-acd882958151\",\"id\":\"744cf3c8-dc1d-4508-a693-b28947c893bd\",\"name\":\"NORDC-APP-SMTP\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-19T09:05:44.891Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-APP-SMTP.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-APP-SMTP$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x798\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-APP-SMTP\\n\\tSource Network Address:\\t34.144.114.37\\n\\tSource Port:\\t\\t51764\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"NORDC-APP-SMTP.stark.com\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-APP-SMTP.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"34.144.114.37\",\"IpPort\":\"51764\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x798\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\inetsrv\\\\inetinfo.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-APP-SMTP$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-APP-SMTP\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":584,\"thread\":{\"id\":3544}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":94310762,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-APP-SMTP.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "94310762", "streamName": "microsoft-windows-security-auditing", "clientIP": "34.144.114.37", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t34.144.114.37\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"34.144.114.37","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-10-19T09:05:44.316Z","agent":{"ephemeral_id":"2e7ed087-cdf9-47f4-82a4-acd882958151","id":"744cf3c8-dc1d-4508-a693-b28947c893bd","name":"NORDC-APP-SMTP","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-19T09:05:44.891Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-APP-SMTP.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-APP-SMTP$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x798\n\tCaller Process Name:\tC:\\Windows\\System32\\inetsrv\\inetinfo.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-APP-SMTP\n\tSource Network Address:\t34.144.114.37\n\tSource Port:\t\t51764\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"NORDC-APP-SMTP.stark.com","sensitivity":"normal","winlog":{"activity_id":"{E6E6C6C5-CCD5-0001-D5C6-E6E6D5CCD901}","api":"wineventlog","channel":"Security","computer_name":"NORDC-APP-SMTP.stark.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"34.144.114.37","IpPort":"51764","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x798","ProcessName":"C:\\Windows\\System32\\inetsrv\\inetinfo.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-APP-SMTP$","SubjectUserSid":"S-1-5-18","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-APP-SMTP"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":584,"thread":{"id":3544}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":94310762,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 51764 messagetype: auth_failure productids: [6] senderhost: NORDC-APP-SMTP.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 94310762 streamName: microsoft-windows-security-auditing clientIP: 34.144.114.37 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPGMRM3RKTMZG0UL0LSK","flash_version":"uninstalled","hostname":null,"ip":"123.151.137.59","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Panama City","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DISUJC3EGNA5D5ZWSKC6","name":"HUB - Production"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"205-504-4803"},"email":"alice@acme.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-04T21:36:29.301884+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659648989,"txid":"c24aa41d-c700-44db-9536-6c3e85ccd332","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHU29O2ONMWYQDZ25OZ","name":"alice"}} ::: program=Chrome ::: clientIP=123.151.137.59 ::: userName=alice ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1659648989", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "HUB - Production", "messagetype": "credential_access", "clienthostname": "205-504-4803", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.134\",\"epkey\":\"EPGMRM3RKTMZG0UL0LSK\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"123.151.137.59\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Panama City\",\"country\":\"United States\",\"state\":\"Florida\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DISUJC3EGNA5D5ZWSKC6\",\"name\":\"HUB - Production\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"205-504-4803\"},\"email\":\"alice@acme.com\",\"event_type\":\"authentication\",\"factor\":\"phone_call\",\"isotimestamp\":\"2022-08-04T21:36:29.301884+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659648989,\"txid\":\"c24aa41d-c700-44db-9536-6c3e85ccd332\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUHU29O2ONMWYQDZ25OZ\",\"name\":\"alice\"}} ::: program=Chrome ::: clientIP=123.151.137.59 ::: userName=alice ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "123.151.137.59", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPGMRM3RKTMZG0UL0LSK","flash_version":"uninstalled","hostname":null,"ip":"123.151.137.59","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Panama City","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DISUJC3EGNA5D5ZWSKC6","name":"HUB - Production"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"205-504-4803"},"email":"alice@acme.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-04T21:36:29.301884+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659648989,"txid":"c24aa41d-c700-44db-9536-6c3e85ccd332","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHU29O2ONMWYQDZ25OZ","name":"alice"}} ::: program=Chrome ::: clientIP=123.151.137.59 ::: userName=alice ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPGMRM3RKTMZG0UL0LSK","flash_version":"uninstalled","hostname":null,"ip":"123.151.137.59","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Panama City","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DISUJC3EGNA5D5ZWSKC6","name":"HUB - Production"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"205-504-4803"},"email":"alice@acme.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-04T21:36:29.301884+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659648989,"txid":"c24aa41d-c700-44db-9536-6c3e85ccd332","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHU29O2ONMWYQDZ25OZ","name":"alice"}} ::: program=Chrome ::: clientIP=123.151.137.59 ::: userName=alice ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1659648989 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: HUB - Production messagetype: credential_access clienthostname: 205-504-4803 streamName: DUO clientIP: 123.151.137.59 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPGMRM3RKTMZG0UL0LSK","flash_version":"uninstalled","hostname":null,"ip":"18.114.90.219","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Panama City","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DISUJC3EGNA5D5ZWSKC6","name":"HUB - Production"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"205-504-4803"},"email":"charlie@stark.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-04T21:36:29.301884+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659648989,"txid":"c24aa41d-c700-44db-9536-6c3e85ccd332","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHU29O2ONMWYQDZ25OZ","name":"charlie"}} ::: program=Chrome ::: clientIP=18.114.90.219 ::: userName=charlie ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1659648989", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "HUB - Production", "messagetype": "credential_access", "clienthostname": "205-504-4803", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"103.0.5060.134\",\"epkey\":\"EPGMRM3RKTMZG0UL0LSK\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"18.114.90.219\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Panama City\",\"country\":\"United States\",\"state\":\"Florida\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DISUJC3EGNA5D5ZWSKC6\",\"name\":\"HUB - Production\"},\"auth_device\":{\"ip\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"205-504-4803\"},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"phone_call\",\"isotimestamp\":\"2022-08-04T21:36:29.301884+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659648989,\"txid\":\"c24aa41d-c700-44db-9536-6c3e85ccd332\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUHU29O2ONMWYQDZ25OZ\",\"name\":\"charlie\"}} ::: program=Chrome ::: clientIP=18.114.90.219 ::: userName=charlie ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "18.114.90.219", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPGMRM3RKTMZG0UL0LSK","flash_version":"uninstalled","hostname":null,"ip":"18.114.90.219","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Panama City","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DISUJC3EGNA5D5ZWSKC6","name":"HUB - Production"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"205-504-4803"},"email":"charlie@stark.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-04T21:36:29.301884+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659648989,"txid":"c24aa41d-c700-44db-9536-6c3e85ccd332","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHU29O2ONMWYQDZ25OZ","name":"charlie"}} ::: program=Chrome ::: clientIP=18.114.90.219 ::: userName=charlie ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"103.0.5060.134","epkey":"EPGMRM3RKTMZG0UL0LSK","flash_version":"uninstalled","hostname":null,"ip":"18.114.90.219","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Panama City","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DISUJC3EGNA5D5ZWSKC6","name":"HUB - Production"},"auth_device":{"ip":null,"location":{"city":null,"country":null,"state":null},"name":"205-504-4803"},"email":"charlie@stark.com","event_type":"authentication","factor":"phone_call","isotimestamp":"2022-08-04T21:36:29.301884+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659648989,"txid":"c24aa41d-c700-44db-9536-6c3e85ccd332","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHU29O2ONMWYQDZ25OZ","name":"charlie"}} ::: program=Chrome ::: clientIP=18.114.90.219 ::: userName=charlie ::: created_at=1659648989 ::: streamName=DUO ::: application=HUB - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659648989 ::: clientHostname=205-504-4803 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1659648989 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: HUB - Production messagetype: credential_access clienthostname: 205-504-4803 streamName: DUO clientIP: 18.114.90.219 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.144.173.164 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=212.144.173.164 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "212.144.173.164", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.144.173.164 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=212.144.173.164 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 212.144.173.164 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=151.161.217.173 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=151.161.217.173 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "151.161.217.173", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=151.161.217.173 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=151.161.217.173 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 151.161.217.173 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=121.11.11.79 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=121.11.11.79 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "121.11.11.79", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=121.11.11.79 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=121.11.11.79 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 121.11.11.79 userName: fish
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:53:52Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=12.99.45.148 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:53:52Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=12.99.45.148 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:53:52Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "12.99.45.148", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:53:52Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=12.99.45.148 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:53:52Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=12.99.45.148 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:53:52Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 12.99.45.148 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"charlie","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.75.4.215 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:21:58Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" query HKLM/f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=156.75.4.215 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:21:58Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "156.75.4.215", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"charlie","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.75.4.215 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:21:58Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" query HKLM/f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"charlie","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597001528958","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599743696330","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599722485826"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.75.4.215 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:21:58Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:21:58Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:21:58Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 156.75.4.215 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:53:52Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=235.30.134.64 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:53:52Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=235.30.134.64 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:53:52Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "235.30.134.64", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:53:52Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=235.30.134.64 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:53:52Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674312640252","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675348787220","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=235.30.134.64 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:53:52Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:53:52Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:53:52Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 235.30.134.64 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=134.175.14.79 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\nighthawk\Downloads\PSTools\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\nighthawk\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\nighthawk\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=134.175.14.79 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "134.175.14.79", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=134.175.14.79 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\nighthawk\Downloads\PSTools\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\nighthawk\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=134.175.14.79 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\nighthawk\Downloads\PSTools\PsExec.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 134.175.14.79 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\alice\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\alice\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.115.186.127 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\alice\Downloads\PSTools\PsExec.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\alice\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\alice\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=185.115.186.127 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\alice\\Downloads\\PSTools\\PsExec.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "185.115.186.127", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\alice\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\alice\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.115.186.127 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\alice\Downloads\PSTools\PsExec.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\alice\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\alice\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.115.186.127 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\alice\Downloads\PSTools\PsExec.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 185.115.186.127 userName: alice
Explain this syslog message
<134>Feb 15 06:22:49 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1005936|Identified Local File Inclusion (LFI) Over HTTP|10|cn1=36299 cn1Label=Host ID dvc=66.32.58.17 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=199.255.136.250 dst=66.32.58.17 in=537 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=34846 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=47 cn3Label=DPI Packet Position cs5=15827 cs5Label=DPI Stream Position cs1="LFI-5" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
{ "senderhost": "34.205.5.1", "serverport": 80, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "DPI Stream Position :15827", "DPI Note:LFI-5", "trend micro_deep security agent_Identified Local File Inclusion (LFI) Over HTTP", "rfc3164", "Fragmentation Bits:DF 0", "cef", "Identified Local File Inclusion (LFI) Over HTTP", "trend micro_deep security agent", "DPI Flags:8" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Feb 15 06:22:49 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1005936|Identified Local File Inclusion (LFI) Over HTTP|10|cn1=36299 cn1Label=Host ID dvc=66.32.58.17 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=199.255.136.250 dst=66.32.58.17 in=537 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=34846 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=47 cn3Label=DPI Packet Position cs5=15827 cs5Label=DPI Stream Position cs1=\"LFI-5\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags", "localstarttime": "Feb 15 06:22:49", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Identified Local File Inclusion (LFI) Over HTTP", "servermac": "0EB18F8289E5", "clientmac": "0E72244862E9", "clientport": 34846, "vendorcode": "1005936", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "serverbytes": 537, "streamName": "trend micro_deep security agent", "clientIP": "199.255.136.250", "serverIP": "66.32.58.17" }
Create a JSON artifact from the message
<134>Feb 15 06:22:49 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1005936|Identified Local File Inclusion (LFI) Over HTTP|10|cn1=36299 cn1Label=Host ID dvc=66.32.58.17 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=199.255.136.250 dst=66.32.58.17 in=537 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=34846 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=47 cn3Label=DPI Packet Position cs5=15827 cs5Label=DPI Stream Position cs1="LFI-5" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Feb 15 06:22:49 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1005936|Identified Local File Inclusion (LFI) Over HTTP|10|cn1=36299 cn1Label=Host ID dvc=66.32.58.17 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=199.255.136.250 dst=66.32.58.17 in=537 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=34846 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=47 cn3Label=DPI Packet Position cs5=15827 cs5Label=DPI Stream Position cs1="LFI-5" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.1 serverport: 80 severitylabel: emergency tags: ['TCP Flags:ACK PSH', 'DPI Stream Position :15827', 'DPI Note:LFI-5', 'trend micro_deep security agent_Identified Local File Inclusion (LFI) Over HTTP', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'Identified Local File Inclusion (LFI) Over HTTP', 'trend micro_deep security agent', 'DPI Flags:8'] productids: [30] sourceinfo: unknown localstarttime: Feb 15 06:22:49 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Identified Local File Inclusion (LFI) Over HTTP servermac: 0EB18F8289E5 clientmac: 0E72244862E9 clientport: 34846 vendorcode: 1005936 action: IDS:Reset protocol: 6 facilitycode: 16 serverbytes: 537 streamName: trend micro_deep security agent clientIP: 199.255.136.250 serverIP: 66.32.58.17
Explain this syslog message
<134>Feb 15 06:25:27 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=200.41.125.38 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=177.73.92.123 dst=200.41.125.38 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=14562 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="2CmdInjection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.1", "serverport": 80, "severitylabel": "emergency", "tags": [ "DPI Note:2CmdInjection", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position :0", "Identified Suspicious Command Injection Attack - 1", "TCP Flags:ACK PSH", "trend micro_deep security agent_Identified Suspicious Command Injection Attack - 1" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Feb 15 06:25:27 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=200.41.125.38 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=177.73.92.123 dst=200.41.125.38 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=14562 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"2CmdInjection\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Feb 15 06:25:27", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Identified Suspicious Command Injection Attack - 1", "servermac": "0EB18F8289E5", "clientmac": "0E72244862E9", "clientport": 14562, "vendorcode": "1006823", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "177.73.92.123", "serverIP": "200.41.125.38" }
Create a JSON artifact from the message
<134>Feb 15 06:25:27 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=200.41.125.38 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=177.73.92.123 dst=200.41.125.38 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=14562 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="2CmdInjection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Feb 15 06:25:27 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=200.41.125.38 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=177.73.92.123 dst=200.41.125.38 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=14562 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=3 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="2CmdInjection" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.1 serverport: 80 severitylabel: emergency tags: ['DPI Note:2CmdInjection', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0', 'Identified Suspicious Command Injection Attack - 1', 'TCP Flags:ACK PSH', 'trend micro_deep security agent_Identified Suspicious Command Injection Attack - 1'] productids: [30] sourceinfo: unknown localstarttime: Feb 15 06:25:27 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Identified Suspicious Command Injection Attack - 1 servermac: 0EB18F8289E5 clientmac: 0E72244862E9 clientport: 14562 vendorcode: 1006823 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 177.73.92.123 serverIP: 200.41.125.38
Explain this syslog message
<134>Feb 15 06:24:48 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=134.219.39.188 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=45.22.240.161 dst=134.219.39.188 in=573 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=57052 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=71 cn3Label=DPI Packet Position cs5=4695 cs5Label=DPI Stream Position cs1="2CmdInjection" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
{ "senderhost": "34.205.5.1", "serverport": 80, "severitylabel": "emergency", "tags": [ "DPI Stream Position :4695", "DPI Note:2CmdInjection", "rfc3164", "Fragmentation Bits:DF 0", "cef", "trend micro_deep security agent", "DPI Flags:8", "Identified Suspicious Command Injection Attack - 1", "TCP Flags:ACK PSH", "trend micro_deep security agent_Identified Suspicious Command Injection Attack - 1" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Feb 15 06:24:48 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=134.219.39.188 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=45.22.240.161 dst=134.219.39.188 in=573 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=57052 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=71 cn3Label=DPI Packet Position cs5=4695 cs5Label=DPI Stream Position cs1=\"2CmdInjection\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags", "localstarttime": "Feb 15 06:24:48", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Identified Suspicious Command Injection Attack - 1", "servermac": "0EB18F8289E5", "clientmac": "0E72244862E9", "clientport": 57052, "vendorcode": "1006823", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "serverbytes": 573, "streamName": "trend micro_deep security agent", "clientIP": "45.22.240.161", "serverIP": "134.219.39.188" }
Create a JSON artifact from the message
<134>Feb 15 06:24:48 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=134.219.39.188 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=45.22.240.161 dst=134.219.39.188 in=573 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=57052 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=71 cn3Label=DPI Packet Position cs5=4695 cs5Label=DPI Stream Position cs1="2CmdInjection" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Feb 15 06:24:48 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1006823|Identified Suspicious Command Injection Attack - 1|10|cn1=36299 cn1Label=Host ID dvc=134.219.39.188 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=45.22.240.161 dst=134.219.39.188 in=573 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=57052 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=71 cn3Label=DPI Packet Position cs5=4695 cs5Label=DPI Stream Position cs1="2CmdInjection" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.1 serverport: 80 severitylabel: emergency tags: ['DPI Stream Position :4695', 'DPI Note:2CmdInjection', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'trend micro_deep security agent', 'DPI Flags:8', 'Identified Suspicious Command Injection Attack - 1', 'TCP Flags:ACK PSH', 'trend micro_deep security agent_Identified Suspicious Command Injection Attack - 1'] productids: [30] sourceinfo: unknown localstarttime: Feb 15 06:24:48 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Identified Suspicious Command Injection Attack - 1 servermac: 0EB18F8289E5 clientmac: 0E72244862E9 clientport: 57052 vendorcode: 1006823 action: IDS:Reset protocol: 6 facilitycode: 16 serverbytes: 573 streamName: trend micro_deep security agent clientIP: 45.22.240.161 serverIP: 134.219.39.188
Explain this syslog message
<134>Feb 15 06:22:49 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1005936|Identified Local File Inclusion (LFI) Over HTTP|10|cn1=36299 cn1Label=Host ID dvc=145.71.190.173 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=57.89.24.137 dst=145.71.190.173 in=537 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=34846 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=47 cn3Label=DPI Packet Position cs5=15827 cs5Label=DPI Stream Position cs1="LFI-5" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags
{ "senderhost": "34.205.5.1", "serverport": 80, "severitylabel": "emergency", "tags": [ "TCP Flags:ACK PSH", "DPI Stream Position :15827", "DPI Note:LFI-5", "trend micro_deep security agent_Identified Local File Inclusion (LFI) Over HTTP", "rfc3164", "Fragmentation Bits:DF 0", "cef", "Identified Local File Inclusion (LFI) Over HTTP", "trend micro_deep security agent", "DPI Flags:8" ], "productids": [ 30 ], "sourceinfo": "unknown", "message": "<134>Feb 15 06:22:49 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1770|1005936|Identified Local File Inclusion (LFI) Over HTTP|10|cn1=36299 cn1Label=Host ID dvc=145.71.190.173 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:B1:8F:82:89:E5 smac=0E:72:24:48:62:E9 TrendMicroDsFrameType=IP src=57.89.24.137 dst=145.71.190.173 in=537 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=34846 dpt=80 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=47 cn3Label=DPI Packet Position cs5=15827 cs5Label=DPI Stream Position cs1=\"LFI-5\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags", "localstarttime": "Feb 15 06:22:49", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Identified Local File Inclusion (LFI) Over HTTP", "servermac": "0EB18F8289E5", "clientmac": "0E72244862E9", "clientport": 34846, "vendorcode": "1005936", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "serverbytes": 537, "streamName": "trend micro_deep security agent", "clientIP": "57.89.24.137", "serverIP": "145.71.190.173" }
Create a JSON artifact from the message