input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t239.233.74.68\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.233.74.68","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 35842 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7074533030 streamName: microsoft-windows-security-auditing clientIP: 239.233.74.68 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t47.29.233.15\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"47.29.233.15","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
{ "action": "Logon", "clientport": 35842, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-29T02:22:43.114Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-29T02:22:43.832Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t47.29.233.15\\n\\tSource Port:\\t\\t35842\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"47.29.233.15\",\"IpPort\":\"35842\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":18072}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7074533030,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7074533030", "streamName": "microsoft-windows-security-auditing", "clientIP": "47.29.233.15", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t47.29.233.15\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"47.29.233.15","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t47.29.233.15\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"47.29.233.15","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 35842 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7074533030 streamName: microsoft-windows-security-auditing clientIP: 47.29.233.15 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t74.0.3.10\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.0.3.10","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
{ "action": "Logon", "clientport": 35842, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-29T02:22:43.114Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-29T02:22:43.832Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t74.0.3.10\\n\\tSource Port:\\t\\t35842\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"74.0.3.10\",\"IpPort\":\"35842\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":18072}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7074533030,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7074533030", "streamName": "microsoft-windows-security-auditing", "clientIP": "74.0.3.10", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t74.0.3.10\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.0.3.10","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t74.0.3.10\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.0.3.10","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 35842 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7074533030 streamName: microsoft-windows-security-auditing clientIP: 74.0.3.10 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t24.184.98.195\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"24.184.98.195","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
{ "action": "Logon", "clientport": 35842, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-29T02:22:43.114Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-29T02:22:43.832Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t24.184.98.195\\n\\tSource Port:\\t\\t35842\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"24.184.98.195\",\"IpPort\":\"35842\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":18072}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7074533030,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "7074533030", "streamName": "microsoft-windows-security-auditing", "clientIP": "24.184.98.195", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t24.184.98.195\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"24.184.98.195","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t24.184.98.195\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"24.184.98.195","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 35842 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 7074533030 streamName: microsoft-windows-security-auditing clientIP: 24.184.98.195 userName: $
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"180.213.141.28","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"alice"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1665134530", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "NORDC-SAPRDP", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"180.213.141.28\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:22:10.585229+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665134530,\"txid\":\"7b62d81c-26df-4f57-b654-cbec5a8f30d5\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"alice\"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "180.213.141.28", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"180.213.141.28","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"alice"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"180.213.141.28","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"alice"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1665134530 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: NORDC-SAPRDP streamName: DUO clientIP: 180.213.141.28 userName: alice
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"67.166.12.138","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"johndoe"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1665134530", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "NORDC-SAPRDP", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"67.166.12.138\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:22:10.585229+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665134530,\"txid\":\"7b62d81c-26df-4f57-b654-cbec5a8f30d5\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"johndoe\"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "67.166.12.138", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"67.166.12.138","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"johndoe"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"67.166.12.138","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"johndoe"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1665134530 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: NORDC-SAPRDP streamName: DUO clientIP: 67.166.12.138 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"130.159.192.73","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1665136335", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "NORDC-SAPRDP", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"130.159.192.73\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:15.324070+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136335,\"txid\":\"d706de5e-8568-4c30-bf71-011eb2035dd8\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "130.159.192.73", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"130.159.192.73","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"130.159.192.73","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1665136335 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: NORDC-SAPRDP streamName: DUO clientIP: 130.159.192.73 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"112.72.185.78","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1665136335", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "NORDC-SAPRDP", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"112.72.185.78\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:15.324070+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136335,\"txid\":\"d706de5e-8568-4c30-bf71-011eb2035dd8\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "112.72.185.78", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"112.72.185.78","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"112.72.185.78","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1665136335 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: NORDC-SAPRDP streamName: DUO clientIP: 112.72.185.78 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"144.252.219.185","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1665136352", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "NORDC-SAPRDP", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"144.252.219.185\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:32.928853+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136352,\"txid\":\"519dd20e-5dc4-4705-873c-ca63b54ab9a0\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"janedoe\"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "144.252.219.185", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"144.252.219.185","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"144.252.219.185","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1665136352 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: NORDC-SAPRDP streamName: DUO clientIP: 144.252.219.185 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"153.238.8.46","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
{ "program": "null", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1665136352", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "null", "sensitivity": "normal", "application": "Microsoft RDP", "messagetype": "credential_access", "clienthostname": "NORDC-SAPRDP", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"153.238.8.46\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:32.928853+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136352,\"txid\":\"519dd20e-5dc4-4705-873c-ca63b54ab9a0\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "153.238.8.46", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"153.238.8.46","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"153.238.8.46","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: null senderhost: localhost severitylabel: critical starttimeutc: 1665136352 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: null sensitivity: normal application: Microsoft RDP messagetype: credential_access clienthostname: NORDC-SAPRDP streamName: DUO clientIP: 153.238.8.46 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"nighthawk","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"nighthawk\",\"email\":\"nighthawk\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"10.215.178.187\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"10.215.178.187\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "SAFARI", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Ernesto Austria | South Bay Branch", "auth_failure", "description=User attempted unauthorized access to app" ], "vendorcode": "app.generic.unauth_app_access_attempt", "streamName": "Okta", "clientIP": "10.215.178.187", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"nighthawk","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"nighthawk","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: SAFARI senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app'] vendorcode: app.generic.unauth_app_access_attempt streamName: Okta clientIP: 10.215.178.187 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"bob","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"bob","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"bob\",\"email\":\"bob\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"bob\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"89.188.128.139\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"89.188.128.139\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "SAFARI", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Ernesto Austria | South Bay Branch", "auth_failure", "description=User attempted unauthorized access to app" ], "vendorcode": "app.generic.unauth_app_access_attempt", "streamName": "Okta", "clientIP": "89.188.128.139", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"bob","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"bob","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"bob","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"bob","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: SAFARI senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app'] vendorcode: app.generic.unauth_app_access_attempt streamName: Okta clientIP: 89.188.128.139 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"johndoe","email":"johndoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"johndoe","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"johndoe\",\"email\":\"johndoe\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"johndoe\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"18.147.9.154\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"18.147.9.154\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "SAFARI", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Ernesto Austria | South Bay Branch", "auth_failure", "description=User attempted unauthorized access to app" ], "vendorcode": "app.generic.unauth_app_access_attempt", "streamName": "Okta", "clientIP": "18.147.9.154", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"johndoe","email":"johndoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"johndoe","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"johndoe","email":"johndoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"johndoe","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: SAFARI senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app'] vendorcode: app.generic.unauth_app_access_attempt streamName: Okta clientIP: 18.147.9.154 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"charlie","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
{ "action": "FAILURE", "georegion": "United States", "message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"charlie\",\"email\":\"charlie\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"charlie\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"9.135.137.41\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"9.135.137.41\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch", "messagetype": "auth_failure", "productids": [ 6 ], "program": "SAFARI", "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 3, "severitylabel": "error", "sourceinfo": "unknown", "tags": [ "reason=WitFoo.Switch(FAILURE)", "Okta", "userDisplay=Ernesto Austria | South Bay Branch", "auth_failure", "description=User attempted unauthorized access to app" ], "vendorcode": "app.generic.unauth_app_access_attempt", "streamName": "Okta", "clientIP": "9.135.137.41", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"charlie","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
Product: Okta Vendor: Okta
Identify this syslog message
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"charlie","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message: action: FAILURE georegion: United States messagetype: auth_failure productids: [6] program: SAFARI senderhost: kafka.precinct sensitivity: normal severitycode: 3 severitylabel: error sourceinfo: unknown tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app'] vendorcode: app.generic.unauth_app_access_attempt streamName: Okta clientIP: 9.135.137.41 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t73.86.44.205\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"73.86.44.205","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
{ "action": "Logon", "clientport": 52671, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t73.86.44.205\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"73.86.44.205\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "192.168.10.46", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "424620677", "streamName": "microsoft-windows-security-auditing", "clientIP": "73.86.44.205", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t73.86.44.205\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"73.86.44.205","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t73.86.44.205\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"73.86.44.205","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52671 messagetype: auth_failure productids: [6] senderhost: 192.168.10.46 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 424620677 streamName: microsoft-windows-security-auditing clientIP: 73.86.44.205 userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t255.43.62.244\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"255.43.62.244","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
{ "action": "Logon", "clientport": 52671, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t255.43.62.244\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"255.43.62.244\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "192.168.10.46", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "424620677", "streamName": "microsoft-windows-security-auditing", "clientIP": "255.43.62.244", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t255.43.62.244\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"255.43.62.244","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t255.43.62.244\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"255.43.62.244","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52671 messagetype: auth_failure productids: [6] senderhost: 192.168.10.46 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 424620677 streamName: microsoft-windows-security-auditing clientIP: 255.43.62.244 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t13.183.199.130\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.183.199.130","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
{ "action": "Logon", "clientport": 52671, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t13.183.199.130\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"13.183.199.130\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "192.168.10.46", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "424620677", "streamName": "microsoft-windows-security-auditing", "clientIP": "13.183.199.130", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t13.183.199.130\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.183.199.130","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t13.183.199.130\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.183.199.130","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52671 messagetype: auth_failure productids: [6] senderhost: 192.168.10.46 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 424620677 streamName: microsoft-windows-security-auditing clientIP: 13.183.199.130 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t134.147.120.247\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.147.120.247","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
{ "action": "Logon", "clientport": 52671, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t134.147.120.247\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"134.147.120.247\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "192.168.10.46", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "424620677", "streamName": "microsoft-windows-security-auditing", "clientIP": "134.147.120.247", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t134.147.120.247\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.147.120.247","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t134.147.120.247\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.147.120.247","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 52671 messagetype: auth_failure productids: [6] senderhost: 192.168.10.46 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 424620677 streamName: microsoft-windows-security-auditing clientIP: 134.147.120.247 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t77.2.150.146\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"77.2.150.146","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
{ "action": "Logon", "clientport": 41906, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t77.2.150.146\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"77.2.150.146\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1263680968", "streamName": "microsoft-windows-security-auditing", "clientIP": "77.2.150.146", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t77.2.150.146\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"77.2.150.146","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t77.2.150.146\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"77.2.150.146","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 41906 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1263680968 streamName: microsoft-windows-security-auditing clientIP: 77.2.150.146 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t167.224.157.252\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"167.224.157.252","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
{ "action": "Logon", "clientport": 41906, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t167.224.157.252\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"Nordc-DC-03.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"167.224.157.252\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1263680968", "streamName": "microsoft-windows-security-auditing", "clientIP": "167.224.157.252", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t167.224.157.252\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"167.224.157.252","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t167.224.157.252\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"167.224.157.252","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 41906 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1263680968 streamName: microsoft-windows-security-auditing clientIP: 167.224.157.252 userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t48.59.237.94\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.59.237.94","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
{ "action": "Logon", "clientport": 41906, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t48.59.237.94\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"48.59.237.94\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1263680968", "streamName": "microsoft-windows-security-auditing", "clientIP": "48.59.237.94", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t48.59.237.94\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.59.237.94","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t48.59.237.94\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.59.237.94","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 41906 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1263680968 streamName: microsoft-windows-security-auditing clientIP: 48.59.237.94 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t225.186.20.135\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"225.186.20.135","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
{ "action": "Logon", "clientport": 41906, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t225.186.20.135\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"225.186.20.135\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "Nordc-DC-03.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "1263680968", "streamName": "microsoft-windows-security-auditing", "clientIP": "225.186.20.135", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t225.186.20.135\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"225.186.20.135","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t225.186.20.135\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"225.186.20.135","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 41906 messagetype: auth_failure productids: [6] senderhost: Nordc-DC-03.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 1263680968 streamName: microsoft-windows-security-auditing clientIP: 225.186.20.135 userName: fish
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "200.206.70.92" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 200.206.70.92
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "122.210.231.152" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 122.210.231.152
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "62.115.204.238" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 62.115.204.238
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "221.209.5.217" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 221.209.5.217
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "222.10.164.12" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 222.10.164.12
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "102.129.133.110" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 102.129.133.110
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "41.217.244.231" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 41.217.244.231
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "245.166.236.91" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 245.166.236.91
Explain this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 11 22:10:53", "message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1691791853", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "168.197.189.32" }
Create a JSON artifact from the message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 11 22:10:53 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1691791853 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 168.197.189.32
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"238.90.164.201","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@stark.bank\"],\"senderIP\":\"238.90.164.201\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "238.90.164.201" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"238.90.164.201","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"238.90.164.201","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 238.90.164.201
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"21.85.197.170","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"21.85.197.170\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "21.85.197.170" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"21.85.197.170","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"21.85.197.170","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 21.85.197.170
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"247.73.169.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch
{ "emailsubject": "Mail delivery failed: returning message to sender", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-21T20:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "productids": [ 32, 0 ], "filename": "from: subj: Mail delivery failed: returning message to sender", "severitycode": 2, "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"247.73.169.104\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "emailsendingserver": "103.1.114.52", "messagetype": "email_protection_event", "filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>", "vendorcode": "blocked_message", "action": "block", "streamName": "proofpoint_protect", "serverIP": "247.73.169.104" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"247.73.169.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"247.73.169.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: emailsubject: Mail delivery failed: returning message to sender senderhost: localhost severitylabel: critical starttimeutc: 2022-12-21T20:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] productids: [32, 0] filename: from: subj: Mail delivery failed: returning message to sender severitycode: 2 sourceinfo: unknown sensitivity: normal emailsendingserver: 103.1.114.52 messagetype: email_protection_event filehash: <E1p6ORz-0003Jr-5z@server.payin.in> vendorcode: blocked_message action: block streamName: proofpoint_protect serverIP: 247.73.169.104
Explain this syslog message