input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"4c0dac0356d5d0022b179ae8b5d301ae","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1703767556538,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"6732cb3d5214e5f797b587ba5575d712","cloud_service":"Office 365","timestamp":1703767039000,"user_id":"user_11c2cc7851a92e8fa0cbfc35d063c74d","user_email":"bob","full_name":"Richard Smith","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Czechia, Zlinsky kraj, Borsice","geo_location":[17.350839614868164,49.062538146972656],"intelligence":[{"ip_address":"250.218.136.123"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for bob, from Bruteforcer 250.218.136.123 (UnArtel s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-12-28\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: unartel.cz\\n\\nBehavioral indicators for bob: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: ios/16.6//mobile safari////iphone/apple)\\nRare isp score: High (common isp: T-Mobile USA Inc.)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=250.218.136.123 ::: userName=bob ::: geoRegion=Czechia, Zlinsky kraj, Borsice ::: created_at=1703767556538 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Czechia, Zlinsky kraj, Borsice
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 250.218.136.123
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"4c0dac0356d5d0022b179ae8b5d301ae","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1703767556538,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"6732cb3d5214e5f797b587ba5575d712","cloud_service":"Office 365","timestamp":1703767039000,"user_id":"user_11c2cc7851a92e8fa0cbfc35d063c74d","user_email":"bob","full_name":"Richard Smith","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Czechia, Zlinsky kraj, Borsice","geo_location":[17.350839614868164,49.062538146972656],"intelligence":[{"ip_address":"171.202.144.43"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for bob, from Bruteforcer 171.202.144.43 (UnArtel s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-12-28\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: unartel.cz\\n\\nBehavioral indicators for bob: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: ios/16.6//mobile safari////iphone/apple)\\nRare isp score: High (common isp: T-Mobile USA Inc.)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=171.202.144.43 ::: userName=bob ::: geoRegion=Czechia, Zlinsky kraj, Borsice ::: created_at=1703767556538 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | {
"action": "block",
"georegion": "Czechia, Zlinsky kraj, Borsice",
"message": "WitFoo-Artifact ::: tags=[\"title=CPB - Failed Suspicious Login\",\"description=Failed Suspicious Login Has Been Detected\",\"detail=undefined\"] ::: action=blocked ::: message={\"id\":\"4c0dac0356d5d0022b179ae8b5d301ae\",\"tenant_id\":\"tenant_a41e6a657eef469dbfe7b26dbeeb4827\",\"timestamp\":1703767556538,\"severity\":\"LOW\",\"title\":\"CPB - Failed Suspicious Login\",\"description\":\"Failed Suspicious Login Has Been Detected\",\"type\":\"Footprint\",\"sub_type\":\"Suspicious Login\",\"related_events\":[{\"event_id\":\"6732cb3d5214e5f797b587ba5575d712\",\"cloud_service\":\"Office 365\",\"timestamp\":1703767039000,\"user_id\":\"user_11c2cc7851a92e8fa0cbfc35d063c74d\",\"user_email\":\"bob\",\"full_name\":\"Richard Smith\",\"user_agent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36\",\"location\":\"Czechia, Zlinsky kraj, Borsice\",\"geo_location\":[17.350839614868164,49.062538146972656],\"intelligence\":[{\"ip_address\":\"171.202.144.43\"}],\"event_classification\":{\"id\":\"9852\",\"category\":\"Suspicious Login\",\"sub_category\":\"Suspicious Login\",\"threat\":\"Authentication\"},\"meta_data\":{\"extracted_fields\":[{\"129064\":\"[\\\"50\\\"]\"},{\"129065\":\"[\\\"Failure\\\"]\"},{\"129067\":\"[\\\"Suspicious login attempt detected for bob, from Bruteforcer 171.202.144.43 (UnArtel s.r.o.) \\\\n\\\\nThreat intelligence: \\\\nProofpoint CASB | IP Last Seen On: 2023-12-28\\\\nProofpoint CASB | Categories: Bruteforcer\\\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\\\nIP Enrichments | Domain: unartel.cz\\\\n\\\\nBehavioral indicators for bob: \\\\nRare country score: High (common country: United States)\\\\nRare user agent score: High (common user agent: ios/16.6//mobile safari////iphone/apple)\\\\nRare isp score: High (common isp: T-Mobile USA Inc.)\\\"]\"},{\"129068\":\"[\\\"Low\\\"]\"}]}}]} ::: program=Office 365 ::: clientIP=171.202.144.43 ::: userName=bob ::: geoRegion=Czechia, Zlinsky kraj, Borsice ::: created_at=1703767556538 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "Office 365",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"description=Failed Suspicious Login Has Been Detected",
"proofpoint_casb",
"title=CPB - Failed Suspicious Login",
"detail=undefined",
"auth_failure"
],
"vendorcode": "9852",
"streamName": "proofpoint_casb",
"clientIP": "171.202.144.43",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"4c0dac0356d5d0022b179ae8b5d301ae","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1703767556538,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"6732cb3d5214e5f797b587ba5575d712","cloud_service":"Office 365","timestamp":1703767039000,"user_id":"user_11c2cc7851a92e8fa0cbfc35d063c74d","user_email":"bob","full_name":"Richard Smith","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Czechia, Zlinsky kraj, Borsice","geo_location":[17.350839614868164,49.062538146972656],"intelligence":[{"ip_address":"171.202.144.43"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for bob, from Bruteforcer 171.202.144.43 (UnArtel s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-12-28\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: unartel.cz\\n\\nBehavioral indicators for bob: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: ios/16.6//mobile safari////iphone/apple)\\nRare isp score: High (common isp: T-Mobile USA Inc.)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=171.202.144.43 ::: userName=bob ::: geoRegion=Czechia, Zlinsky kraj, Borsice ::: created_at=1703767556538 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | Product: CASB
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: tags=["title=CPB - Failed Suspicious Login","description=Failed Suspicious Login Has Been Detected","detail=undefined"] ::: action=blocked ::: message={"id":"4c0dac0356d5d0022b179ae8b5d301ae","tenant_id":"tenant_a41e6a657eef469dbfe7b26dbeeb4827","timestamp":1703767556538,"severity":"LOW","title":"CPB - Failed Suspicious Login","description":"Failed Suspicious Login Has Been Detected","type":"Footprint","sub_type":"Suspicious Login","related_events":[{"event_id":"6732cb3d5214e5f797b587ba5575d712","cloud_service":"Office 365","timestamp":1703767039000,"user_id":"user_11c2cc7851a92e8fa0cbfc35d063c74d","user_email":"bob","full_name":"Richard Smith","user_agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","location":"Czechia, Zlinsky kraj, Borsice","geo_location":[17.350839614868164,49.062538146972656],"intelligence":[{"ip_address":"171.202.144.43"}],"event_classification":{"id":"9852","category":"Suspicious Login","sub_category":"Suspicious Login","threat":"Authentication"},"meta_data":{"extracted_fields":[{"129064":"[\"50\"]"},{"129065":"[\"Failure\"]"},{"129067":"[\"Suspicious login attempt detected for bob, from Bruteforcer 171.202.144.43 (UnArtel s.r.o.) \\n\\nThreat intelligence: \\nProofpoint CASB | IP Last Seen On: 2023-12-28\\nProofpoint CASB | Categories: Bruteforcer\\nIP Enrichments | Usage Type: ISP (Fixed Line ISP)\\nIP Enrichments | Domain: unartel.cz\\n\\nBehavioral indicators for bob: \\nRare country score: High (common country: United States)\\nRare user agent score: High (common user agent: ios/16.6//mobile safari////iphone/apple)\\nRare isp score: High (common isp: T-Mobile USA Inc.)\"]"},{"129068":"[\"Low\"]"}]}}]} ::: program=Office 365 ::: clientIP=171.202.144.43 ::: userName=bob ::: geoRegion=Czechia, Zlinsky kraj, Borsice ::: created_at=1703767556538 ::: streamName=proofpoint_casb ::: vendorCode=9852 ::: messageType=auth_failure ::: pipelineName=proofpoint_casb ::: severityCode=4 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called CASB by ProofPoint. The following fields were extracted from the message:
action: block
georegion: Czechia, Zlinsky kraj, Borsice
messagetype: auth_failure
productids: [6]
program: Office 365
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['description=Failed Suspicious Login Has Been Detected', 'proofpoint_casb', 'title=CPB - Failed Suspicious Login', 'detail=undefined', 'auth_failure']
vendorcode: 9852
streamName: proofpoint_casb
clientIP: 171.202.144.43
userName: bob | Explain this syslog message |
<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:89.189.107.44/57712 dst outside:12.235.114.116/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:89.189.107.44/57712 dst outside:12.235.114.116/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57712,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "89.189.107.44",
"serverIP": "12.235.114.116"
} | Create a JSON artifact from the message |
<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:89.189.107.44/57712 dst outside:12.235.114.116/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:89.189.107.44/57712 dst outside:12.235.114.116/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57712
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 89.189.107.44
serverIP: 12.235.114.116 | Explain this syslog message |
<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.149.126.215/57712 dst outside:22.170.124.72/80 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.149.126.215/57712 dst outside:22.170.124.72/80 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57712,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "91.149.126.215",
"serverIP": "22.170.124.72"
} | Create a JSON artifact from the message |
<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.149.126.215/57712 dst outside:22.170.124.72/80 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 26 2023 02:33:53 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.149.126.215/57712 dst outside:22.170.124.72/80 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 80
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57712
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 91.149.126.215
serverIP: 22.170.124.72 | Explain this syslog message |
<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 120.113.51.239/41925->56.142.197.209/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934 | {
"senderhost": "10.19.251.5",
"serverport": 84,
"severitylabel": "informational",
"tags": [
"rfc3164",
"juniper_srx",
"routing_info"
],
"productids": [
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 120.113.51.239/41925->56.142.197.209/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934",
"action": "block",
"localstarttime": "Mar 26 02:15:55",
"sensitivity": "normal",
"application": "None",
"rulename": "DENY",
"program": "RT_FLOW",
"localhostname": "aurdcfwj1-s",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "routing_info",
"clientport": 41925,
"protocol": 6,
"facilitycode": 1,
"streamName": "juniper_srx",
"clientIP": "120.113.51.239",
"serverIP": "56.142.197.209",
"userName": "alice"
} | Create a JSON artifact from the message |
<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 120.113.51.239/41925->56.142.197.209/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934 | Product: Juniper FW
Vendor: Juniper | Identify this syslog message |
<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 120.113.51.239/41925->56.142.197.209/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934 | This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message:
senderhost: 10.19.251.5
serverport: 84
severitylabel: informational
tags: ['rfc3164', 'juniper_srx', 'routing_info']
productids: [0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 26 02:15:55
sensitivity: normal
application: None
rulename: DENY
program: RT_FLOW
localhostname: aurdcfwj1-s
priority: 14
facilitylabel: user-level
messagetype: routing_info
clientport: 41925
protocol: 6
facilitycode: 1
streamName: juniper_srx
clientIP: 120.113.51.239
serverIP: 56.142.197.209
userName: alice | Explain this syslog message |
<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 110.217.97.56/41925->234.177.47.21/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934 | {
"senderhost": "10.19.251.5",
"serverport": 84,
"severitylabel": "informational",
"tags": [
"rfc3164",
"juniper_srx",
"routing_info"
],
"productids": [
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 110.217.97.56/41925->234.177.47.21/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934",
"action": "block",
"localstarttime": "Mar 26 02:15:55",
"sensitivity": "normal",
"application": "None",
"rulename": "DENY",
"program": "RT_FLOW",
"localhostname": "aurdcfwj1-s",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "routing_info",
"clientport": 41925,
"protocol": 6,
"facilitycode": 1,
"streamName": "juniper_srx",
"clientIP": "110.217.97.56",
"serverIP": "234.177.47.21",
"userName": "alice"
} | Create a JSON artifact from the message |
<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 110.217.97.56/41925->234.177.47.21/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934 | Product: Juniper FW
Vendor: Juniper | Identify this syslog message |
<14>Mar 26 02:15:55 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 110.217.97.56/41925->234.177.47.21/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz1 UNKNOWN UNKNOWN alice reth3.934 | This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message:
senderhost: 10.19.251.5
serverport: 84
severitylabel: informational
tags: ['rfc3164', 'juniper_srx', 'routing_info']
productids: [0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 26 02:15:55
sensitivity: normal
application: None
rulename: DENY
program: RT_FLOW
localhostname: aurdcfwj1-s
priority: 14
facilitylabel: user-level
messagetype: routing_info
clientport: 41925
protocol: 6
facilitycode: 1
streamName: juniper_srx
clientIP: 110.217.97.56
serverIP: 234.177.47.21
userName: alice | Explain this syslog message |
<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 20.141.150.80/44983->40.244.99.222/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN fish reth3.934 | {
"senderhost": "10.19.251.5",
"serverport": 84,
"severitylabel": "informational",
"tags": [
"rfc3164",
"juniper_srx",
"routing_info"
],
"productids": [
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 20.141.150.80/44983->40.244.99.222/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN fish reth3.934",
"action": "block",
"localstarttime": "Mar 26 02:16:11",
"sensitivity": "normal",
"application": "None",
"rulename": "DENY",
"program": "RT_FLOW",
"localhostname": "aurdcfwj1-s",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "routing_info",
"clientport": 44983,
"protocol": 6,
"facilitycode": 1,
"streamName": "juniper_srx",
"clientIP": "20.141.150.80",
"serverIP": "40.244.99.222",
"userName": "fish"
} | Create a JSON artifact from the message |
<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 20.141.150.80/44983->40.244.99.222/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN fish reth3.934 | Product: Juniper FW
Vendor: Juniper | Identify this syslog message |
<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 20.141.150.80/44983->40.244.99.222/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN fish reth3.934 | This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message:
senderhost: 10.19.251.5
serverport: 84
severitylabel: informational
tags: ['rfc3164', 'juniper_srx', 'routing_info']
productids: [0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 26 02:16:11
sensitivity: normal
application: None
rulename: DENY
program: RT_FLOW
localhostname: aurdcfwj1-s
priority: 14
facilitylabel: user-level
messagetype: routing_info
clientport: 44983
protocol: 6
facilitycode: 1
streamName: juniper_srx
clientIP: 20.141.150.80
serverIP: 40.244.99.222
userName: fish | Explain this syslog message |
<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 132.237.116.138/44983->207.178.156.234/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN charlie reth3.934 | {
"senderhost": "10.19.251.5",
"serverport": 84,
"severitylabel": "informational",
"tags": [
"rfc3164",
"juniper_srx",
"routing_info"
],
"productids": [
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 132.237.116.138/44983->207.178.156.234/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN charlie reth3.934",
"action": "block",
"localstarttime": "Mar 26 02:16:11",
"sensitivity": "normal",
"application": "None",
"rulename": "DENY",
"program": "RT_FLOW",
"localhostname": "aurdcfwj1-s",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "routing_info",
"clientport": 44983,
"protocol": 6,
"facilitycode": 1,
"streamName": "juniper_srx",
"clientIP": "132.237.116.138",
"serverIP": "207.178.156.234",
"userName": "charlie"
} | Create a JSON artifact from the message |
<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 132.237.116.138/44983->207.178.156.234/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN charlie reth3.934 | Product: Juniper FW
Vendor: Juniper | Identify this syslog message |
<14>Mar 26 02:16:11 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 132.237.116.138/44983->207.178.156.234/84 None 6(0) DENY vrf-corp-intsec vrf-tis-pdz4 UNKNOWN UNKNOWN charlie reth3.934 | This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message:
senderhost: 10.19.251.5
serverport: 84
severitylabel: informational
tags: ['rfc3164', 'juniper_srx', 'routing_info']
productids: [0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 26 02:16:11
sensitivity: normal
application: None
rulename: DENY
program: RT_FLOW
localhostname: aurdcfwj1-s
priority: 14
facilitylabel: user-level
messagetype: routing_info
clientport: 44983
protocol: 6
facilitycode: 1
streamName: juniper_srx
clientIP: 132.237.116.138
serverIP: 207.178.156.234
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-12T15:12:28.892Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-12T15:12:29.701Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-12608\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0xABB5B170\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0xabb5b170","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-12608"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":2156}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4196310603,"task":"Special Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4672",
"microsoft-windows-security-auditing",
"security_privilege_change"
],
"productids": [
43
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-08-12T15:12:28.892Z\",\"agent\":{\"ephemeral_id\":\"4943a2dd-eef2-412c-b496-8cc639fd9bc1\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-12T15:12:29.701Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-21-4204541585-151547883-1297828959-12608\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0xABB5B170\\n\\nPrivileges:\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\\n\\t\\t\\tSeEnableDelegationPrivilege\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"PrivilegeList\":\"SeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\\n\\t\\t\\tSeEnableDelegationPrivilege\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0xabb5b170\",\"SubjectUserName\":\"nighthawk\",\"SubjectUserSid\":\"S-1-5-21-4204541585-151547883-1297828959-12608\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2156}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4196310603,\"task\":\"Special Logon\"}}",
"sensitivity": "normal",
"messagetype": "security_privilege_change",
"vendorcode": "4196310603",
"action": "Special Logon",
"streamName": "microsoft-windows-security-auditing",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-12T15:12:28.892Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-12T15:12:29.701Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-12608\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0xABB5B170\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0xabb5b170","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-12608"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":2156}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4196310603,"task":"Special Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-12T15:12:28.892Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-12T15:12:29.701Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-12608\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0xABB5B170\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0xabb5b170","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-12608"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":2156}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4196310603,"task":"Special Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change']
productids: [43]
sourceinfo: unknown
sensitivity: normal
messagetype: security_privilege_change
vendorcode: 4196310603
action: Special Logon
streamName: microsoft-windows-security-auditing
userName: nighthawk | Explain this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:140.207.143.18/137 dst outside:137.59.217.159/137 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 137,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:140.207.143.18/137 dst outside:137.59.217.159/137 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 137,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "140.207.143.18",
"serverIP": "137.59.217.159"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:140.207.143.18/137 dst outside:137.59.217.159/137 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:140.207.143.18/137 dst outside:137.59.217.159/137 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 137
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 137
vendorcode: PIX-4-106023
action: block
protocol: 17
facilitycode: 21
streamName: cisco_pix
clientIP: 140.207.143.18
serverIP: 137.59.217.159 | Explain this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:199.65.27.24/137 dst outside:122.63.132.26/137 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 137,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:199.65.27.24/137 dst outside:122.63.132.26/137 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 137,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "199.65.27.24",
"serverIP": "122.63.132.26"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:199.65.27.24/137 dst outside:122.63.132.26/137 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny udp src inside:199.65.27.24/137 dst outside:122.63.132.26/137 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 137
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 137
vendorcode: PIX-4-106023
action: block
protocol: 17
facilitycode: 21
streamName: cisco_pix
clientIP: 199.65.27.24
serverIP: 122.63.132.26 | Explain this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:38.52.47.69/50840 dst outside:237.228.183.124/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:38.52.47.69/50840 dst outside:237.228.183.124/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50840,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "38.52.47.69",
"serverIP": "237.228.183.124"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:38.52.47.69/50840 dst outside:237.228.183.124/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:38.52.47.69/50840 dst outside:237.228.183.124/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50840
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 38.52.47.69
serverIP: 237.228.183.124 | Explain this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:152.162.41.101/50840 dst outside:187.10.119.117/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:152.162.41.101/50840 dst outside:187.10.119.117/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 50840,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "152.162.41.101",
"serverIP": "187.10.119.117"
} | Create a JSON artifact from the message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:152.162.41.101/50840 dst outside:187.10.119.117/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 03 2023 19:44:51 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:152.162.41.101/50840 dst outside:187.10.119.117/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 50840
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 152.162.41.101
serverIP: 187.10.119.117 | Explain this syslog message |
<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:11.122.27.50/54019 dst outside:40.0.38.28/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:11.122.27.50/54019 dst outside:40.0.38.28/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54019,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "11.122.27.50",
"serverIP": "40.0.38.28"
} | Create a JSON artifact from the message |
<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:11.122.27.50/54019 dst outside:40.0.38.28/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:11.122.27.50/54019 dst outside:40.0.38.28/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54019
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 11.122.27.50
serverIP: 40.0.38.28 | Explain this syslog message |
<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:78.2.18.200/54019 dst outside:82.24.81.73/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:78.2.18.200/54019 dst outside:82.24.81.73/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54019,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "78.2.18.200",
"serverIP": "82.24.81.73"
} | Create a JSON artifact from the message |
<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:78.2.18.200/54019 dst outside:82.24.81.73/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 26 2023 12:48:05 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:78.2.18.200/54019 dst outside:82.24.81.73/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54019
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 78.2.18.200
serverIP: 82.24.81.73 | Explain this syslog message |
<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:101.112.126.51/63741 dst outside:253.136.230.210/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:101.112.126.51/63741 dst outside:253.136.230.210/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 63741,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "101.112.126.51",
"serverIP": "253.136.230.210"
} | Create a JSON artifact from the message |
<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:101.112.126.51/63741 dst outside:253.136.230.210/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:101.112.126.51/63741 dst outside:253.136.230.210/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 63741
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 101.112.126.51
serverIP: 253.136.230.210 | Explain this syslog message |
<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:225.250.23.134/63741 dst outside:218.203.67.140/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:225.250.23.134/63741 dst outside:218.203.67.140/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 63741,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "225.250.23.134",
"serverIP": "218.203.67.140"
} | Create a JSON artifact from the message |
<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:225.250.23.134/63741 dst outside:218.203.67.140/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 26 2023 12:48:24 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:225.250.23.134/63741 dst outside:218.203.67.140/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 63741
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 225.250.23.134
serverIP: 218.203.67.140 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t68.240.149.178\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"68.240.149.178","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:51.694Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:53.527Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t68.240.149.178\\n\\tSource Port:\\t\\t53035\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"68.240.149.178\",\"IpPort\":\"53035\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2524}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680141534,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53035,
"vendorcode": "4680141534",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "68.240.149.178",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t68.240.149.178\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"68.240.149.178","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t68.240.149.178\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"68.240.149.178","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53035
vendorcode: 4680141534
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 68.240.149.178
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t133.176.177.255\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.176.177.255","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:51.694Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:53.527Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t133.176.177.255\\n\\tSource Port:\\t\\t53035\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (wayne.waynecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"133.176.177.255\",\"IpPort\":\"53035\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2524}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680141534,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53035,
"vendorcode": "4680141534",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "133.176.177.255",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t133.176.177.255\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.176.177.255","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t133.176.177.255\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.176.177.255","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53035
vendorcode: 4680141534
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 133.176.177.255
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t134.42.194.22\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.42.194.22","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:51.694Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:53.527Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t134.42.194.22\\n\\tSource Port:\\t\\t53035\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"134.42.194.22\",\"IpPort\":\"53035\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2524}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680141534,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53035,
"vendorcode": "4680141534",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "134.42.194.22",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t134.42.194.22\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.42.194.22","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t134.42.194.22\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"134.42.194.22","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53035
vendorcode: 4680141534
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 134.42.194.22
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t153.87.181.57\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.87.181.57","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:51.694Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:53.527Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t153.87.181.57\\n\\tSource Port:\\t\\t53035\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"153.87.181.57\",\"IpPort\":\"53035\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2524}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680141534,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53035,
"vendorcode": "4680141534",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "153.87.181.57",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t153.87.181.57\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.87.181.57","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t153.87.181.57\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.87.181.57","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53035
vendorcode: 4680141534
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 153.87.181.57
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t13.123.91.140\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.123.91.140","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:51.694Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:53.527Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t13.123.91.140\\n\\tSource Port:\\t\\t53035\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"13.123.91.140\",\"IpPort\":\"53035\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2524}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680141534,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53035,
"vendorcode": "4680141534",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "13.123.91.140",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t13.123.91.140\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.123.91.140","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t13.123.91.140\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"13.123.91.140","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53035
vendorcode: 4680141534
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 13.123.91.140
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t79.53.242.253\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"79.53.242.253","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:51.694Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:53.527Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t79.53.242.253\\n\\tSource Port:\\t\\t53035\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"79.53.242.253\",\"IpPort\":\"53035\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2524}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680141534,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53035,
"vendorcode": "4680141534",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "79.53.242.253",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t79.53.242.253\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"79.53.242.253","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:51.694Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:53.527Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t79.53.242.253\n\tSource Port:\t\t53035\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"79.53.242.253","IpPort":"53035","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2524}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680141534,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53035
vendorcode: 4680141534
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 79.53.242.253
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t51.51.132.148\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"51.51.132.148","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.327Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:24.546Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t51.51.132.148\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"51.51.132.148\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139443,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139443",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "51.51.132.148",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t51.51.132.148\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"51.51.132.148","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t51.51.132.148\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"51.51.132.148","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139443
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 51.51.132.148
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t169.214.185.206\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"169.214.185.206","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.327Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:24.546Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t169.214.185.206\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (wayne.waynecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"169.214.185.206\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139443,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139443",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "169.214.185.206",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t169.214.185.206\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"169.214.185.206","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t169.214.185.206\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"169.214.185.206","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139443
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 169.214.185.206
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.47.234.86\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.47.234.86","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.327Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:24.546Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t115.47.234.86\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (wayne.waynecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"115.47.234.86\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139443,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139443",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "115.47.234.86",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.47.234.86\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.47.234.86","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.47.234.86\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.47.234.86","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139443
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 115.47.234.86
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.167.101.68\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.167.101.68","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.314Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:23.490Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t115.167.101.68\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"115.167.101.68\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139424,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139424",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "115.167.101.68",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.167.101.68\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.167.101.68","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.167.101.68\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.167.101.68","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139424
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 115.167.101.68
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t37.30.96.117\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"37.30.96.117","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.314Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:23.490Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t37.30.96.117\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"37.30.96.117\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139424,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139424",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "37.30.96.117",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t37.30.96.117\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"37.30.96.117","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t37.30.96.117\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"37.30.96.117","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139424
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 37.30.96.117
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t31.49.122.42\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"31.49.122.42","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.314Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:23.490Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t31.49.122.42\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"31.49.122.42\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139424,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139424",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "31.49.122.42",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t31.49.122.42\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"31.49.122.42","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.314Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:23.490Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t31.49.122.42\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"31.49.122.42","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139424,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139424
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 31.49.122.42
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t237.63.50.252\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"237.63.50.252","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.327Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:24.546Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t237.63.50.252\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"237.63.50.252\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139443,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139443",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "237.63.50.252",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t237.63.50.252\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"237.63.50.252","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t237.63.50.252\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"237.63.50.252","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139443
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 237.63.50.252
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t64.50.206.101\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.50.206.101","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.327Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:24.546Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t64.50.206.101\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"64.50.206.101\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139443,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139443",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "64.50.206.101",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t64.50.206.101\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.50.206.101","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t64.50.206.101\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"64.50.206.101","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139443
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 64.50.206.101
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t102.235.46.47\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"102.235.46.47","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T16:55:23.327Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T16:55:24.546Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t102.235.46.47\\n\\tSource Port:\\t\\t53010\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"102.235.46.47\",\"IpPort\":\"53010\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2512}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680139443,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 53010,
"vendorcode": "4680139443",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "102.235.46.47",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t102.235.46.47\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"102.235.46.47","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T16:55:23.327Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T16:55:24.546Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t102.235.46.47\n\tSource Port:\t\t53010\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"102.235.46.47","IpPort":"53010","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2512}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680139443,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 53010
vendorcode: 4680139443
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 102.235.46.47
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"188.83.161.216","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=188.83.161.216 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=188.83.161.216 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@stark.bank\"],\"senderIP\":\"188.83.161.216\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=188.83.161.216 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=188.83.161.216 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "188.83.161.216"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"188.83.161.216","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=188.83.161.216 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=188.83.161.216 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"188.83.161.216","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=188.83.161.216 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=188.83.161.216 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 188.83.161.216 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@wayne.bank"],"senderIP":"174.217.237.35","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=174.217.237.35 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=174.217.237.35 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@wayne.bank\"],\"senderIP\":\"174.217.237.35\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=174.217.237.35 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=174.217.237.35 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "174.217.237.35"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@wayne.bank"],"senderIP":"174.217.237.35","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=174.217.237.35 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=174.217.237.35 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@wayne.bank"],"senderIP":"174.217.237.35","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=174.217.237.35 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=174.217.237.35 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 174.217.237.35 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.