input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t239.233.74.68\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"239.233.74.68","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 35842
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7074533030
streamName: microsoft-windows-security-auditing
clientIP: 239.233.74.68
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t47.29.233.15\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"47.29.233.15","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | {
"action": "Logon",
"clientport": 35842,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-29T02:22:43.114Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-29T02:22:43.832Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t47.29.233.15\\n\\tSource Port:\\t\\t35842\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"47.29.233.15\",\"IpPort\":\"35842\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":18072}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7074533030,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7074533030",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "47.29.233.15",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t47.29.233.15\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"47.29.233.15","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t47.29.233.15\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"47.29.233.15","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 35842
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7074533030
streamName: microsoft-windows-security-auditing
clientIP: 47.29.233.15
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t74.0.3.10\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.0.3.10","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | {
"action": "Logon",
"clientport": 35842,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-29T02:22:43.114Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-29T02:22:43.832Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t74.0.3.10\\n\\tSource Port:\\t\\t35842\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"74.0.3.10\",\"IpPort\":\"35842\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":18072}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7074533030,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7074533030",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "74.0.3.10",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t74.0.3.10\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.0.3.10","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t74.0.3.10\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"74.0.3.10","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 35842
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7074533030
streamName: microsoft-windows-security-auditing
clientIP: 74.0.3.10
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t24.184.98.195\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"24.184.98.195","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | {
"action": "Logon",
"clientport": 35842,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-04-29T02:22:43.114Z\",\"agent\":{\"ephemeral_id\":\"445bb357-2862-48a9-81e8-277377b3b8f5\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-29T02:22:43.832Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t24.184.98.195\\n\\tSource Port:\\t\\t35842\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"24.184.98.195\",\"IpPort\":\"35842\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":744,\"thread\":{\"id\":18072}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":7074533030,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "7074533030",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "24.184.98.195",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t24.184.98.195\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"24.184.98.195","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-04-29T02:22:43.114Z","agent":{"ephemeral_id":"445bb357-2862-48a9-81e8-277377b3b8f5","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-29T02:22:43.832Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t24.184.98.195\n\tSource Port:\t\t35842\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"24.184.98.195","IpPort":"35842","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":744,"thread":{"id":18072}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":7074533030,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 35842
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 7074533030
streamName: microsoft-windows-security-auditing
clientIP: 24.184.98.195
userName: $ | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"180.213.141.28","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"alice"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1665134530",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "NORDC-SAPRDP",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"180.213.141.28\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:22:10.585229+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665134530,\"txid\":\"7b62d81c-26df-4f57-b654-cbec5a8f30d5\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"alice\"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "180.213.141.28",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"180.213.141.28","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"alice"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"180.213.141.28","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"alice"}} ::: program=null ::: clientIP=180.213.141.28 ::: userName=alice ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1665134530
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: NORDC-SAPRDP
streamName: DUO
clientIP: 180.213.141.28
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"67.166.12.138","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"johndoe"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1665134530",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "NORDC-SAPRDP",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"67.166.12.138\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:22:10.585229+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665134530,\"txid\":\"7b62d81c-26df-4f57-b654-cbec5a8f30d5\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"johndoe\"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "67.166.12.138",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"67.166.12.138","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"johndoe"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"67.166.12.138","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:22:10.585229+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665134530,"txid":"7b62d81c-26df-4f57-b654-cbec5a8f30d5","user":{"groups":[],"key":null,"name":"johndoe"}} ::: program=null ::: clientIP=67.166.12.138 ::: userName=johndoe ::: created_at=1665134530 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665134530 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1665134530
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: NORDC-SAPRDP
streamName: DUO
clientIP: 67.166.12.138
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"130.159.192.73","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1665136335",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "NORDC-SAPRDP",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"130.159.192.73\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:15.324070+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136335,\"txid\":\"d706de5e-8568-4c30-bf71-011eb2035dd8\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "130.159.192.73",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"130.159.192.73","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"130.159.192.73","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=130.159.192.73 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1665136335
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: NORDC-SAPRDP
streamName: DUO
clientIP: 130.159.192.73
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"112.72.185.78","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1665136335",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "NORDC-SAPRDP",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"112.72.185.78\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:15.324070+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136335,\"txid\":\"d706de5e-8568-4c30-bf71-011eb2035dd8\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "112.72.185.78",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"112.72.185.78","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"112.72.185.78","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:15.324070+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136335,"txid":"d706de5e-8568-4c30-bf71-011eb2035dd8","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=112.72.185.78 ::: userName=charlie ::: created_at=1665136335 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136335 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1665136335
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: NORDC-SAPRDP
streamName: DUO
clientIP: 112.72.185.78
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"144.252.219.185","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1665136352",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "NORDC-SAPRDP",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"144.252.219.185\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:32.928853+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136352,\"txid\":\"519dd20e-5dc4-4705-873c-ca63b54ab9a0\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"janedoe\"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "144.252.219.185",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"144.252.219.185","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"144.252.219.185","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"janedoe"}} ::: program=null ::: clientIP=144.252.219.185 ::: userName=janedoe ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1665136352
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: NORDC-SAPRDP
streamName: DUO
clientIP: 144.252.219.185
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"153.238.8.46","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1665136352",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "NORDC-SAPRDP",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=allow_unenrolled_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"NORDC-SAPRDP\",\"ip\":\"153.238.8.46\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{},\"alias\":\"unknown\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":null,\"event_type\":\"authentication\",\"factor\":\"not_available\",\"isotimestamp\":\"2022-10-07T09:52:32.928853+00:00\",\"ood_software\":null,\"reason\":\"allow_unenrolled_user\",\"result\":\"success\",\"timestamp\":1665136352,\"txid\":\"519dd20e-5dc4-4705-873c-ca63b54ab9a0\",\"user\":{\"groups\":[],\"key\":null,\"name\":\"charlie\"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "153.238.8.46",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"153.238.8.46","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=allow_unenrolled_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"NORDC-SAPRDP","ip":"153.238.8.46","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{},"alias":"unknown","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":null,"event_type":"authentication","factor":"not_available","isotimestamp":"2022-10-07T09:52:32.928853+00:00","ood_software":null,"reason":"allow_unenrolled_user","result":"success","timestamp":1665136352,"txid":"519dd20e-5dc4-4705-873c-ca63b54ab9a0","user":{"groups":[],"key":null,"name":"charlie"}} ::: program=null ::: clientIP=153.238.8.46 ::: userName=charlie ::: created_at=1665136352 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1665136352 ::: clientHostname=NORDC-SAPRDP ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1665136352
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: NORDC-SAPRDP
streamName: DUO
clientIP: 153.238.8.46
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"nighthawk","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"nighthawk\",\"email\":\"nighthawk\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"nighthawk\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"10.215.178.187\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"10.215.178.187\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "SAFARI",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Ernesto Austria | South Bay Branch",
"auth_failure",
"description=User attempted unauthorized access to app"
],
"vendorcode": "app.generic.unauth_app_access_attempt",
"streamName": "Okta",
"clientIP": "10.215.178.187",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"nighthawk","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"nighthawk","email":"nighthawk"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://acme.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://acme.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://acme.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"nighthawk","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"10.215.178.187","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=10.215.178.187 ::: userName=nighthawk ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: SAFARI
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app']
vendorcode: app.generic.unauth_app_access_attempt
streamName: Okta
clientIP: 10.215.178.187
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"bob","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"bob","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"bob\",\"email\":\"bob\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"bob\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"89.188.128.139\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"89.188.128.139\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "SAFARI",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Ernesto Austria | South Bay Branch",
"auth_failure",
"description=User attempted unauthorized access to app"
],
"vendorcode": "app.generic.unauth_app_access_attempt",
"streamName": "Okta",
"clientIP": "89.188.128.139",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"bob","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"bob","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"bob","email":"bob"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://stark.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://stark.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://stark.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"bob","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"89.188.128.139","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=89.188.128.139 ::: userName=bob ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: SAFARI
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app']
vendorcode: app.generic.unauth_app_access_attempt
streamName: Okta
clientIP: 89.188.128.139
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"johndoe","email":"johndoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"johndoe","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"johndoe\",\"email\":\"johndoe\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"johndoe\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"18.147.9.154\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"18.147.9.154\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "SAFARI",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Ernesto Austria | South Bay Branch",
"auth_failure",
"description=User attempted unauthorized access to app"
],
"vendorcode": "app.generic.unauth_app_access_attempt",
"streamName": "Okta",
"clientIP": "18.147.9.154",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"johndoe","email":"johndoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"johndoe","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"johndoe","email":"johndoe"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"johndoe","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"18.147.9.154","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=18.147.9.154 ::: userName=johndoe ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: SAFARI
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app']
vendorcode: app.generic.unauth_app_access_attempt
streamName: Okta
clientIP: 18.147.9.154
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"charlie","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=User attempted unauthorized access to app\",\"userDisplay=Ernesto Austria | South Bay Branch\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u57vin9addDNkwp697\",\"status\":\"ACTIVE\",\"created\":\"2023-05-01T17:55:32.000Z\",\"activated\":\"2023-06-09T16:30:07.000Z\",\"statusChanged\":\"2023-06-09T16:30:07.000Z\",\"lastLogin\":\"2023-08-21T22:31:10.000Z\",\"lastUpdated\":\"2023-07-15T02:15:13.000Z\",\"passwordChanged\":null,\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"Ernesto\",\"lastName\":\"Austria\",\"primaryPhone\":\"(424) 348-2180\",\"immutableID\":\"ulU+OioBk0etjV9bYErkeg==\",\"mobilePhone\":null,\"displayName\":\"Ernesto Austria\",\"countryCode\":\"US\",\"secondEmail\":null,\"title\":\"Portfolio Manager\",\"department\":\"South Bay Branch\",\"login\":\"charlie\",\"email\":\"charlie\"},\"credentials\":{\"provider\":{\"type\":\"ACTIVE_DIRECTORY\",\"name\":\"SDPB.LOCAL\"}},\"_links\":{\"suspend\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697\"},\"resetFactors\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u57vin9addDNkwp697\",\"type\":\"User\",\"alternateId\":\"charlie\",\"displayName\":\"Ernesto Austria\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1\",\"os\":\"Mac OS X (iPhone)\",\"browser\":\"SAFARI\"},\"zone\":\"null\",\"device\":\"Mobile\",\"id\":null,\"ipAddress\":\"9.135.137.41\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":null,\"credentialProvider\":null,\"credentialType\":null,\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"idxquxZ4JB1Q22ZAJtUojDusQ\"},\"displayMessage\":\"User attempted unauthorized access to app\",\"eventType\":\"app.generic.unauth_app_access_attempt\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":null},\"published\":\"2023-08-21T22:03:53.025Z\",\"securityContext\":{\"asNumber\":20001,\"asOrg\":\"charter communications inc\",\"isp\":\"charter communications inc\",\"domain\":\"rr.com\",\"isProxy\":false},\"severity\":\"WARN\",\"debugContext\":{\"debugData\":{\"authnRequestId\":\"ZOPfGlFauclQR0o9dWGvqwAABxk\",\"deviceFingerprint\":\"443f1e572cc825ca5297284627726f09\",\"oktaUserAgentExtended\":\"okta-auth-js/7.0.1 okta-signin-widget-7.9.0\",\"requestId\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"dtHash\":\"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64\",\"requestUri\":\"/idp/idx/identify\",\"threatSuspected\":\"false\",\"url\":\"/idp/idx/identify?\"}},\"legacyEventType\":\"app.generic.unauth_app_access_attempt\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOPfSBkPKAPxF6RahQjNyQAACtk\",\"detail\":{}},\"uuid\":\"9da17bbb-406e-11ee-991f-4fde7d1ccbca\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"9.135.137.41\",\"geographicalContext\":{\"city\":\"Carson\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"90745\",\"geolocation\":{\"lat\":33.8242,\"lon\":-118.268}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa411b0fcRflioIw697\",\"type\":\"AppInstance\",\"alternateId\":\"DocuSign\",\"displayName\":\"DocuSign\",\"detailEntry\":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "SAFARI",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 3,
"severitylabel": "error",
"sourceinfo": "unknown",
"tags": [
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"userDisplay=Ernesto Austria | South Bay Branch",
"auth_failure",
"description=User attempted unauthorized access to app"
],
"vendorcode": "app.generic.unauth_app_access_attempt",
"streamName": "Okta",
"clientIP": "9.135.137.41",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"charlie","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=User attempted unauthorized access to app","userDisplay=Ernesto Austria | South Bay Branch","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u57vin9addDNkwp697","status":"ACTIVE","created":"2023-05-01T17:55:32.000Z","activated":"2023-06-09T16:30:07.000Z","statusChanged":"2023-06-09T16:30:07.000Z","lastLogin":"2023-08-21T22:31:10.000Z","lastUpdated":"2023-07-15T02:15:13.000Z","passwordChanged":null,"type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"Ernesto","lastName":"Austria","primaryPhone":"(424) 348-2180","immutableID":"ulU+OioBk0etjV9bYErkeg==","mobilePhone":null,"displayName":"Ernesto Austria","countryCode":"US","secondEmail":null,"title":"Portfolio Manager","department":"South Bay Branch","login":"charlie","email":"charlie"},"credentials":{"provider":{"type":"ACTIVE_DIRECTORY","name":"SDPB.LOCAL"}},"_links":{"suspend":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://oscorp.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697"},"resetFactors":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://oscorp.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://oscorp.okta.com/api/v1/users/00u57vin9addDNkwp697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u57vin9addDNkwp697","type":"User","alternateId":"charlie","displayName":"Ernesto Austria","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Mozilla/5.0 (iPhone; CPU iPhone OS 16_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Mobile/15E148 Safari/604.1","os":"Mac OS X (iPhone)","browser":"SAFARI"},"zone":"null","device":"Mobile","id":null,"ipAddress":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}}},"device":null,"authenticationContext":{"authenticationProvider":null,"credentialProvider":null,"credentialType":null,"issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"idxquxZ4JB1Q22ZAJtUojDusQ"},"displayMessage":"User attempted unauthorized access to app","eventType":"app.generic.unauth_app_access_attempt","outcome":{"result":"FAILURE","reason":null},"published":"2023-08-21T22:03:53.025Z","securityContext":{"asNumber":20001,"asOrg":"charter communications inc","isp":"charter communications inc","domain":"rr.com","isProxy":false},"severity":"WARN","debugContext":{"debugData":{"authnRequestId":"ZOPfGlFauclQR0o9dWGvqwAABxk","deviceFingerprint":"443f1e572cc825ca5297284627726f09","oktaUserAgentExtended":"okta-auth-js/7.0.1 okta-signin-widget-7.9.0","requestId":"ZOPfSBkPKAPxF6RahQjNyQAACtk","dtHash":"ccc7fa7cabda51ceb6783d89b69b5717ecaca2d3b305d9e18095de0bddf0cf64","requestUri":"/idp/idx/identify","threatSuspected":"false","url":"/idp/idx/identify?"}},"legacyEventType":"app.generic.unauth_app_access_attempt","transaction":{"type":"WEB","id":"ZOPfSBkPKAPxF6RahQjNyQAACtk","detail":{}},"uuid":"9da17bbb-406e-11ee-991f-4fde7d1ccbca","version":"0","request":{"ipChain":[{"ip":"9.135.137.41","geographicalContext":{"city":"Carson","state":"California","country":"United States","postalCode":"90745","geolocation":{"lat":33.8242,"lon":-118.268}},"version":"V4","source":null}]},"target":[{"id":"0oa411b0fcRflioIw697","type":"AppInstance","alternateId":"DocuSign","displayName":"DocuSign","detailEntry":null}]}} ::: program=SAFARI ::: clientIP=9.135.137.41 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-21T22:03:53.025Z ::: streamName=Okta ::: vendorCode=app.generic.unauth_app_access_attempt ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=3 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: SAFARI
senderhost: kafka.precinct
sensitivity: normal
severitycode: 3
severitylabel: error
sourceinfo: unknown
tags: ['reason=WitFoo.Switch(FAILURE)', 'Okta', 'userDisplay=Ernesto Austria | South Bay Branch', 'auth_failure', 'description=User attempted unauthorized access to app']
vendorcode: app.generic.unauth_app_access_attempt
streamName: Okta
clientIP: 9.135.137.41
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t73.86.44.205\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"73.86.44.205","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52671,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t73.86.44.205\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"73.86.44.205\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "192.168.10.46",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "424620677",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "73.86.44.205",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t73.86.44.205\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"73.86.44.205","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t73.86.44.205\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"73.86.44.205","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52671
messagetype: auth_failure
productids: [6]
senderhost: 192.168.10.46
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 424620677
streamName: microsoft-windows-security-auditing
clientIP: 73.86.44.205
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t255.43.62.244\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"255.43.62.244","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52671,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t255.43.62.244\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"255.43.62.244\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "192.168.10.46",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "424620677",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "255.43.62.244",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t255.43.62.244\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"255.43.62.244","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t255.43.62.244\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"255.43.62.244","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52671
messagetype: auth_failure
productids: [6]
senderhost: 192.168.10.46
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 424620677
streamName: microsoft-windows-security-auditing
clientIP: 255.43.62.244
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t13.183.199.130\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.183.199.130","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52671,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.stark.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t13.183.199.130\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.stark.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"13.183.199.130\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "192.168.10.46",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "424620677",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "13.183.199.130",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t13.183.199.130\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.183.199.130","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.stark.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t13.183.199.130\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.stark.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.183.199.130","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52671
messagetype: auth_failure
productids: [6]
senderhost: 192.168.10.46
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 424620677
streamName: microsoft-windows-security-auditing
clientIP: 13.183.199.130
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t134.147.120.247\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.147.120.247","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52671,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-24T20:42:09.183Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-24T20:42:20.072Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDUO-AUTHPROXY01\\n\\tSource Network Address:\\t134.147.120.247\\n\\tSource Port:\\t\\t52671\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"192.168.10.46\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"134.147.120.247\",\"IpPort\":\"52671\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DUO-AUTHPROXY01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":10636}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":424620677,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "192.168.10.46",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "424620677",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "134.147.120.247",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t134.147.120.247\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.147.120.247","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-24T20:42:09.183Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-24T20:42:20.072Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDUO-AUTHPROXY01\n\tSource Network Address:\t134.147.120.247\n\tSource Port:\t\t52671\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"192.168.10.46","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.147.120.247","IpPort":"52671","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DUO-AUTHPROXY01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":10636}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":424620677,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52671
messagetype: auth_failure
productids: [6]
senderhost: 192.168.10.46
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 424620677
streamName: microsoft-windows-security-auditing
clientIP: 134.147.120.247
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t77.2.150.146\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"77.2.150.146","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | {
"action": "Logon",
"clientport": 41906,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t77.2.150.146\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"77.2.150.146\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1263680968",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "77.2.150.146",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t77.2.150.146\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"77.2.150.146","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t77.2.150.146\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"77.2.150.146","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 41906
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1263680968
streamName: microsoft-windows-security-auditing
clientIP: 77.2.150.146
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t167.224.157.252\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"167.224.157.252","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | {
"action": "Logon",
"clientport": 41906,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t167.224.157.252\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"Nordc-DC-03.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"167.224.157.252\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1263680968",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "167.224.157.252",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t167.224.157.252\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"167.224.157.252","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t167.224.157.252\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"Nordc-DC-03.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.acme.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"167.224.157.252","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 41906
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1263680968
streamName: microsoft-windows-security-auditing
clientIP: 167.224.157.252
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t48.59.237.94\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.59.237.94","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | {
"action": "Logon",
"clientport": 41906,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t48.59.237.94\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"48.59.237.94\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1263680968",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "48.59.237.94",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t48.59.237.94\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.59.237.94","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t48.59.237.94\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"48.59.237.94","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 41906
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1263680968
streamName: microsoft-windows-security-auditing
clientIP: 48.59.237.94
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t225.186.20.135\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"225.186.20.135","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | {
"action": "Logon",
"clientport": 41906,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-06-25T12:47:54.452Z\",\"agent\":{\"ephemeral_id\":\"022c943c-24fc-4b45-a747-ba9649ab6abd\",\"id\":\"5fc2f4d2-daa9-4a5f-bc1f-616148739b10\",\"name\":\"Nordc-DC-03\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-06-25T12:47:55.378Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"Nordc-DC-03.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tNORDC-DC-03$\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\tLogon ID:\\t\\t0x3E7\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x29c\\n\\tCaller Process Name:\\tC:\\\\Windows\\\\System32\\\\lsass.exe\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tNORDC-DC-03\\n\\tSource Network Address:\\t225.186.20.135\\n\\tSource Port:\\t\\t41906\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tAdvapi \\n\\tAuthentication Package:\\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"Nordc-DC-03.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"Nordc-DC-03.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"225.186.20.135\",\"IpPort\":\"41906\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"Advapi \",\"LogonType\":\"3\",\"ProcessId\":\"0x29c\",\"ProcessName\":\"C:\\\\Windows\\\\System32\\\\lsass.exe\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"MDS-ATL\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"NORDC-DC-03$\",\"SubjectUserSid\":\"S-1-5-18\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"NORDC-DC-03\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":668,\"thread\":{\"id\":2232}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1263680968,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "Nordc-DC-03.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "1263680968",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "225.186.20.135",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t225.186.20.135\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"225.186.20.135","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-06-25T12:47:54.452Z","agent":{"ephemeral_id":"022c943c-24fc-4b45-a747-ba9649ab6abd","id":"5fc2f4d2-daa9-4a5f-bc1f-616148739b10","name":"Nordc-DC-03","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-06-25T12:47:55.378Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"Nordc-DC-03.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tNORDC-DC-03$\n\tAccount Domain:\t\tMDS-ATL\n\tLogon ID:\t\t0x3E7\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x29c\n\tCaller Process Name:\tC:\\Windows\\System32\\lsass.exe\n\nNetwork Information:\n\tWorkstation Name:\tNORDC-DC-03\n\tSource Network Address:\t225.186.20.135\n\tSource Port:\t\t41906\n\nDetailed Authentication Information:\n\tLogon Process:\t\tAdvapi \n\tAuthentication Package:\tMICROSOFT_AUTHENTICATION_PACKAGE_V1_0\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"Nordc-DC-03.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"Nordc-DC-03.umbrella.com","event_data":{"AuthenticationPackageName":"MICROSOFT_AUTHENTICATION_PACKAGE_V1_0","FailureReason":"%%2313","IpAddress":"225.186.20.135","IpPort":"41906","KeyLength":"0","LmPackageName":"-","LogonProcessName":"Advapi ","LogonType":"3","ProcessId":"0x29c","ProcessName":"C:\\Windows\\System32\\lsass.exe","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"MDS-ATL","SubjectLogonId":"0x3e7","SubjectUserName":"NORDC-DC-03$","SubjectUserSid":"S-1-5-18","TargetDomainName":"MDS-ATL","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"NORDC-DC-03"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":668,"thread":{"id":2232}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1263680968,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 41906
messagetype: auth_failure
productids: [6]
senderhost: Nordc-DC-03.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 1263680968
streamName: microsoft-windows-security-auditing
clientIP: 225.186.20.135
userName: fish | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "200.206.70.92"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|200.206.70.92|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 200.206.70.92 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "122.210.231.152"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|122.210.231.152|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 122.210.231.152 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "62.115.204.238"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|62.115.204.238|https://shareholders.acme.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 62.115.204.238 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "221.209.5.217"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|221.209.5.217|https://shareholders.oscorp.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 221.209.5.217 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "222.10.164.12"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|222.10.164.12|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 222.10.164.12 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "102.129.133.110"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.umbrella.com|1691791853|access denied|102.129.133.110|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 102.129.133.110 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "41.217.244.231"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|41.217.244.231|https://shareholders.oscorp.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 41.217.244.231 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "245.166.236.91"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.oscorp.com|1691791853|access denied|245.166.236.91|https://shareholders.oscorp.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 245.166.236.91 | Explain this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 11 22:10:53",
"message": "<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1691791853",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "168.197.189.32"
} | Create a JSON artifact from the message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 11 22:10:53 shareholders drupal: https://shareholders.acme.com|1691791853|access denied|168.197.189.32|https://shareholders.acme.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 11 22:10:53
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1691791853
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 168.197.189.32 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"238.90.164.201","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attstarked\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@stark.bank\"],\"senderIP\":\"238.90.164.201\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "238.90.164.201"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"238.90.164.201","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@stark.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"attstarked","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@stark.bank"],"senderIP":"238.90.164.201","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=238.90.164.201 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=238.90.164.201 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 238.90.164.201 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"21.85.197.170","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"21.85.197.170\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "21.85.197.170"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"21.85.197.170","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"21.85.197.170","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=21.85.197.170 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=21.85.197.170 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 21.85.197.170 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"247.73.169.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "Mail delivery failed: returning message to sender",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-21T20:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: subj: Mail delivery failed: returning message to sender",
"severitycode": 2,
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f\",\"threatTime\":\"2022-11-24T13:34:09.000Z\",\"threat\":\"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3\",\"threatTime\":\"2022-11-14T13:19:55.000Z\",\"threat\":\"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/\",\"campaignID\":null,\"threatType\":\"url\"},{\"threatID\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"threatTime\":\"2022-11-25T01:58:35.000Z\",\"threat\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-12-21T20:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Mail delivery failed: returning message to sender\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":4782,\"headerFrom\":\"Mail Delivery System <Mailer-Daemon@server.payin.in>\",\"headerReplyTo\":null,\"fromAddress\":[\"mailer-daemon@server.payin.in\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"cruiz@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"attoscorped\",\"sha256\":\"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78\",\"md5\":\"bdc463c7ac5a8a945b91cf12622104e5\",\"filename\":\"message-delivery-status\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"message/delivery-status\",\"contentType\":\"message/delivery-status\"},{\"disposition\":\"inline\",\"sha256\":\"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341\",\"md5\":\"17902610af251d1af847307c43f48e53\",\"filename\":\"text.txt\",\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09\",\"md5\":\"b2f4b53d172161984fb84aea34e41ed9\",\"filename\":\"\u260e \u25b6 \ud83d\udd18\u2500\u2500\u2500\u2500voice-attchment56432-121_076_454656_3-4(4).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3\",\"QID\":\"3mhagy9j6w-1\",\"GUID\":\"zjA94BCJLd9u6VxujCC12RkAkut8tLAj\",\"sender\":\"\",\"recipient\":[\"cruiz@oscorp.bank\"],\"senderIP\":\"247.73.169.104\",\"messageID\":\"<E1p6ORz-0003Jr-5z@server.payin.in>\"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "103.1.114.52",
"messagetype": "email_protection_event",
"filehash": "<E1p6ORz-0003Jr-5z@server.payin.in>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "247.73.169.104"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"247.73.169.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/8f2959fb1186d14ccb25cfe936f8b478b06457d28f71fed713157c87edcf775f","threatTime":"2022-11-24T13:34:09.000Z","threat":"https://perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/?e=cruiz@oscorp.bank","campaignID":null,"threatType":"url"},{"threatID":"9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/9a11565bfad9f2b97f837243f73b8514c70e2860910a9ca4e45ef05afd64a7a3","threatTime":"2022-11-14T13:19:55.000Z","threat":"perpus.pmli.co.id/admin/admin_template/akasia-dz/assets/vendor/slimscroll/hoodplay/reringoritz2/","campaignID":null,"threatType":"url"},{"threatID":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","threatTime":"2022-11-25T01:58:35.000Z","threat":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-12-21T20:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Mail delivery failed: returning message to sender","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","pdr","urldefense"],"messageSize":4782,"headerFrom":"Mail Delivery System <Mailer-Daemon@server.payin.in>","headerReplyTo":null,"fromAddress":["mailer-daemon@server.payin.in"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["cruiz@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"attoscorped","sha256":"1279731bc0a74f7c091387e8ca74957d95e87ccb21f1fc3fd3cb7a9aeb6c2d78","md5":"bdc463c7ac5a8a945b91cf12622104e5","filename":"message-delivery-status","sandboxStatus":"NOT_SUPPORTED","oContentType":"message/delivery-status","contentType":"message/delivery-status"},{"disposition":"inline","sha256":"6fbb097f844e8ba92a536e2a357ff797bfaf708938e1cf8bd39988f9d42ce341","md5":"17902610af251d1af847307c43f48e53","filename":"text.txt","sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"f5c3170f2f9955e64ae66b5fe864409ede09c7450694383afefa3f9a1c442e09","md5":"b2f4b53d172161984fb84aea34e41ed9","filename":"☎ ▶ 🔘────voice-attchment56432-121_076_454656_3-4(4).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"6cb45d06-6952-de03-ebcc-2c1b59a6f5a3","QID":"3mhagy9j6w-1","GUID":"zjA94BCJLd9u6VxujCC12RkAkut8tLAj","sender":"","recipient":["cruiz@oscorp.bank"],"senderIP":"247.73.169.104","messageID":"<E1p6ORz-0003Jr-5z@server.payin.in>"} ::: fileHash=<E1p6ORz-0003Jr-5z@server.payin.in> ::: fileName=from: subj: Mail delivery failed: returning message to sender ::: serverIP=247.73.169.104 ::: emailFrom= ::: created_at=2022-12-21T20:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Mail delivery failed: returning message to sender ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-12-21T20:19:56.000Z ::: emailSendingServer=247.73.169.104 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: Mail delivery failed: returning message to sender
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-21T20:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: subj: Mail delivery failed: returning message to sender
severitycode: 2
sourceinfo: unknown
sensitivity: normal
emailsendingserver: 103.1.114.52
messagetype: email_protection_event
filehash: <E1p6ORz-0003Jr-5z@server.payin.in>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 247.73.169.104 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.