input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@oscorp.bank"],"senderIP":"138.202.5.240","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=138.202.5.240 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=138.202.5.240 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@oscorp.bank\"],\"senderIP\":\"138.202.5.240\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=138.202.5.240 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=138.202.5.240 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "138.202.5.240"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@oscorp.bank"],"senderIP":"138.202.5.240","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=138.202.5.240 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=138.202.5.240 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@oscorp.bank"],"senderIP":"138.202.5.240","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=138.202.5.240 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=138.202.5.240 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 138.202.5.240 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"135.121.147.204","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=135.121.147.204 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=135.121.147.204 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@stark.bank\"],\"senderIP\":\"135.121.147.204\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=135.121.147.204 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=135.121.147.204 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "135.121.147.204"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"135.121.147.204","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=135.121.147.204 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=135.121.147.204 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"135.121.147.204","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=135.121.147.204 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=135.121.147.204 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 135.121.147.204 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"167.245.52.153","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=167.245.52.153 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=167.245.52.153 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@stark.bank\"],\"senderIP\":\"167.245.52.153\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=167.245.52.153 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=167.245.52.153 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "167.245.52.153"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"167.245.52.153","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=167.245.52.153 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=167.245.52.153 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"167.245.52.153","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=167.245.52.153 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=167.245.52.153 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 167.245.52.153 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@oscorp.bank"],"senderIP":"88.43.207.207","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=88.43.207.207 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=88.43.207.207 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@oscorp.bank\"],\"senderIP\":\"88.43.207.207\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=88.43.207.207 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=88.43.207.207 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "88.43.207.207"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@oscorp.bank"],"senderIP":"88.43.207.207","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=88.43.207.207 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=88.43.207.207 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@oscorp.bank"],"senderIP":"88.43.207.207","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=88.43.207.207 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=88.43.207.207 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 88.43.207.207 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"50.137.91.154","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=50.137.91.154 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=50.137.91.154 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@stark.bank\"],\"senderIP\":\"50.137.91.154\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=50.137.91.154 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=50.137.91.154 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "50.137.91.154"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"50.137.91.154","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=50.137.91.154 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=50.137.91.154 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@stark.bank"],"senderIP":"50.137.91.154","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=50.137.91.154 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=50.137.91.154 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 50.137.91.154 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@acme.bank"],"senderIP":"14.185.51.26","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=14.185.51.26 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=14.185.51.26 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "1 miss call received on 11/10/2022 (GMT+08:30)",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-10T16:14:40.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"threatTime\":\"2022-11-10T16:13:26.000Z\",\"threat\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2022-11-10T16:14:40.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"1 miss call received on 11/10/2022 (GMT+08:30)\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":2924,\"headerFrom\":\"Calprivate|V-Mail\u2122 \u260e\u00ae\\r\\n\\t<sanda.emini@rav.org.rs>\",\"headerReplyTo\":null,\"fromAddress\":[\"sanda.emini@rav.org.rs\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"amasembe@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3\",\"md5\":\"d0ee0e91ade64555753dddb802da771a\",\"filename\":\"\u260e\u00aevoice042456432-121_076_454656_3-2(4).html\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c\",\"QID\":\"3knkpuhxmg-1\",\"GUID\":\"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5\",\"sender\":\"sanda.emini@rav.org.rs\",\"recipient\":[\"amasembe@acme.bank\"],\"senderIP\":\"14.185.51.26\",\"messageID\":\"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>\"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=14.185.51.26 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=14.185.51.26 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "217.26.214.71",
"messagetype": "email_protection_event",
"emailfrom": "sanda.emini@rav.org.rs",
"sourceinfo": "unknown",
"filehash": "<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "14.185.51.26"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@acme.bank"],"senderIP":"14.185.51.26","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=14.185.51.26 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=14.185.51.26 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":100,"threatsInfoMap":[{"threatID":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","threatTime":"2022-11-10T16:13:26.000Z","threat":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-11-10T16:14:40.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"1 miss call received on 11/10/2022 (GMT+08:30)","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","sandbox","spam","dmarc","urldefense"],"messageSize":2924,"headerFrom":"Calprivate|V-Mail™ ☎®\r\n\t<sanda.emini@rav.org.rs>","headerReplyTo":null,"fromAddress":["sanda.emini@rav.org.rs"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["amasembe@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"ad080999be9f277cc9fa743a85c4223561223a4e2c45cdfdc148ce33c9fa7ba3","md5":"d0ee0e91ade64555753dddb802da771a","filename":"☎®voice042456432-121_076_454656_3-2(4).html","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"dc6b19d1-e186-a1ee-cb13-0a0d8dd4f27c","QID":"3knkpuhxmg-1","GUID":"bbVki-ULS08rh3wb2AO_PWiAkO8Iqgl5","sender":"sanda.emini@rav.org.rs","recipient":["amasembe@acme.bank"],"senderIP":"14.185.51.26","messageID":"<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>"} ::: fileHash=<5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs> ::: fileName=from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30) ::: serverIP=14.185.51.26 ::: emailFrom=sanda.emini@rav.org.rs ::: created_at=2022-11-10T16:14:40.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=1 miss call received on 11/10/2022 (GMT+08:30) ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-10T16:14:40.000Z ::: emailSendingServer=14.185.51.26 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: 1 miss call received on 11/10/2022 (GMT+08:30)
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-10T16:14:40.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: sanda.emini@rav.org.rs subj: 1 miss call received on 11/10/2022 (GMT+08:30)
severitycode: 2
sensitivity: normal
emailsendingserver: 217.26.214.71
messagetype: email_protection_event
emailfrom: sanda.emini@rav.org.rs
sourceinfo: unknown
filehash: <5e9f4489-7c2d-5068-7b07-e11f1a9d3f5e@rav.org.rs>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 14.185.51.26 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@oscorp.bank"],"senderIP":"59.187.48.199","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=59.187.48.199 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=59.187.48.199 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@oscorp.bank\"],\"senderIP\":\"59.187.48.199\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=59.187.48.199 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=59.187.48.199 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "59.187.48.199"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@oscorp.bank"],"senderIP":"59.187.48.199","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=59.187.48.199 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=59.187.48.199 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@oscorp.bank"],"senderIP":"59.187.48.199","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=59.187.48.199 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=59.187.48.199 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 59.187.48.199 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@wayne.bank"],"senderIP":"175.82.18.127","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=175.82.18.127 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=175.82.18.127 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@wayne.bank\"],\"senderIP\":\"175.82.18.127\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=175.82.18.127 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=175.82.18.127 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "175.82.18.127"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@wayne.bank"],"senderIP":"175.82.18.127","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=175.82.18.127 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=175.82.18.127 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@wayne.bank"],"senderIP":"175.82.18.127","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=175.82.18.127 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=175.82.18.127 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 175.82.18.127 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@umbrella.bank"],"senderIP":"5.158.181.92","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=5.158.181.92 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=5.158.181.92 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attumbrellament\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attumbrellament Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attumbrellaed\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@umbrella.bank\"],\"senderIP\":\"5.158.181.92\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=5.158.181.92 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=5.158.181.92 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "5.158.181.92"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@umbrella.bank"],"senderIP":"5.158.181.92","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=5.158.181.92 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=5.158.181.92 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attumbrellament"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attumbrellament Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attumbrellaed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@umbrella.bank"],"senderIP":"5.158.181.92","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=5.158.181.92 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=5.158.181.92 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 5.158.181.92 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@stark.bank"],"senderIP":"216.192.249.97","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=216.192.249.97 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=216.192.249.97 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@stark.bank\"],\"senderIP\":\"216.192.249.97\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=216.192.249.97 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=216.192.249.97 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "216.192.249.97"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@stark.bank"],"senderIP":"216.192.249.97","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=216.192.249.97 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=216.192.249.97 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@stark.bank"],"senderIP":"216.192.249.97","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=216.192.249.97 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=216.192.249.97 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 216.192.249.97 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@stark.bank"],"senderIP":"248.55.164.112","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=248.55.164.112 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=248.55.164.112 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attstarkment\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attstarkment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attstarked\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@stark.bank\"],\"senderIP\":\"248.55.164.112\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=248.55.164.112 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=248.55.164.112 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "248.55.164.112"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@stark.bank"],"senderIP":"248.55.164.112","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=248.55.164.112 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=248.55.164.112 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attstarkment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attstarkment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attstarked","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@stark.bank"],"senderIP":"248.55.164.112","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=248.55.164.112 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=248.55.164.112 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 248.55.164.112 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@acme.bank"],"senderIP":"88.250.155.152","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=88.250.155.152 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=88.250.155.152 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attacmement\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attacmement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attacmeed\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@acme.bank\"],\"senderIP\":\"88.250.155.152\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=88.250.155.152 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=88.250.155.152 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "88.250.155.152"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@acme.bank"],"senderIP":"88.250.155.152","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=88.250.155.152 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=88.250.155.152 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attacmement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attacmement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attacmeed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@acme.bank"],"senderIP":"88.250.155.152","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=88.250.155.152 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=88.250.155.152 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 88.250.155.152 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@oscorp.bank"],"senderIP":"180.253.82.169","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=180.253.82.169 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=180.253.82.169 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attoscorpment\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attoscorpment Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attoscorped\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@oscorp.bank\"],\"senderIP\":\"180.253.82.169\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=180.253.82.169 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=180.253.82.169 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "180.253.82.169"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@oscorp.bank"],"senderIP":"180.253.82.169","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=180.253.82.169 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=180.253.82.169 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attoscorpment"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attoscorpment Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attoscorped","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@oscorp.bank"],"senderIP":"180.253.82.169","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=180.253.82.169 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=180.253.82.169 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 180.253.82.169 | Explain this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@wayne.bank"],"senderIP":"74.227.5.72","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=74.227.5.72 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=74.227.5.72 ::: pipelineEntrypoint=dispatch | {
"emailsubject": "_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-09T21:24:10.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"productids": [
32,
0
],
"filename": "from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs",
"severitycode": 2,
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"threatTime\":\"2022-11-09T21:23:07.000Z\",\"threat\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"campaignID\":null,\"threatType\":\"attwaynement\"}],\"messageTime\":\"2022-11-09T21:24:10.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs\",\"quarantineFolder\":\"Attwaynement Defense\",\"quarantineRule\":\"threat\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"dkimv\",\"spf\",\"sandbox\",\"spam\",\"dmarc\",\"urldefense\"],\"messageSize\":5322,\"headerFrom\":\"Calprivate | Telecom\u2122 <media-info@orthodonticbrasil.com.br>\",\"headerReplyTo\":null,\"fromAddress\":[\"media-info@orthodonticbrasil.com.br\"],\"ccAddresses\":[],\"replyToAddress\":[],\"toAddresses\":[\"rpimentel@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\",\"md5\":\"d41d8cd98f00b204e9800998ecf8427e\",\"filename\":null,\"sandboxStatus\":\"NOT_SUPPORTED\",\"oContentType\":\"text/plain\",\"contentType\":\"text/plain\"},{\"disposition\":\"attwayneed\",\"sha256\":\"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7\",\"md5\":\"9d552e17c383c1de4cdaac352f613a4c\",\"filename\":\"\u266c voice58384536728_5-5(7).htm\",\"sandboxStatus\":\"THREAT\",\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"1d0bd442-b828-c843-012e-72834c720bf5\",\"QID\":\"3knp7hhms7-1\",\"GUID\":\"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg\",\"sender\":\"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com\",\"recipient\":[\"rpimentel@wayne.bank\"],\"senderIP\":\"74.227.5.72\",\"messageID\":\"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>\"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=74.227.5.72 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=74.227.5.72 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"emailsendingserver": "198.2.137.24",
"messagetype": "email_protection_event",
"emailfrom": "bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com",
"sourceinfo": "unknown",
"filehash": "<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>",
"vendorcode": "blocked_message",
"action": "block",
"streamName": "proofpoint_protect",
"serverIP": "74.227.5.72"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@wayne.bank"],"senderIP":"74.227.5.72","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=74.227.5.72 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=74.227.5.72 ::: pipelineEntrypoint=dispatch | Product: Protect
Vendor: ProofPoint | Identify this syslog message |
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","threatTime":"2022-11-09T21:23:07.000Z","threat":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","campaignID":null,"threatType":"attwaynement"}],"messageTime":"2022-11-09T21:24:10.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs","quarantineFolder":"Attwaynement Defense","quarantineRule":"threat","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","dkimv","spf","sandbox","spam","dmarc","urldefense"],"messageSize":5322,"headerFrom":"Calprivate | Telecom™ <media-info@orthodonticbrasil.com.br>","headerReplyTo":null,"fromAddress":["media-info@orthodonticbrasil.com.br"],"ccAddresses":[],"replyToAddress":[],"toAddresses":["rpimentel@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855","md5":"d41d8cd98f00b204e9800998ecf8427e","filename":null,"sandboxStatus":"NOT_SUPPORTED","oContentType":"text/plain","contentType":"text/plain"},{"disposition":"attwayneed","sha256":"5c626ed847110794e671d613fbab1bdbf2ec4c05eba756dffa28752de9855bf7","md5":"9d552e17c383c1de4cdaac352f613a4c","filename":"♬ voice58384536728_5-5(7).htm","sandboxStatus":"THREAT","oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"1d0bd442-b828-c843-012e-72834c720bf5","QID":"3knp7hhms7-1","GUID":"TK43ImXG8La9g-k2V6nVnQWtXiMxibmg","sender":"bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com","recipient":["rpimentel@wayne.bank"],"senderIP":"74.227.5.72","messageID":"<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>"} ::: fileHash=<646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br> ::: fileName=from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: serverIP=74.227.5.72 ::: emailFrom=bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com ::: created_at=2022-11-09T21:24:10.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=_Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2022-11-09T21:24:10.000Z ::: emailSendingServer=74.227.5.72 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
emailsubject: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-09T21:24:10.000Z
tags: ['proofpoint_protect', 'email_protection_event']
productids: [32, 0]
filename: from: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com subj: _Incoming Call From 15078740926 For Calprivate At 15:23 PM for 30 secs
severitycode: 2
sensitivity: normal
emailsendingserver: 198.2.137.24
messagetype: email_protection_event
emailfrom: bounce-md_31126165.636c19e2.v1-ce60a5e353df466e92467753f3339f07@mandrillapp.com
sourceinfo: unknown
filehash: <646ca6d5-69c2-7276-2e0a-1e459a363156@orthodonticbrasil.com.br>
vendorcode: blocked_message
action: block
streamName: proofpoint_protect
serverIP: 74.227.5.72 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t35.116.111.121\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.116.111.121","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:27:15.252Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:27:16.489Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t35.116.111.121\\n\\tSource Port:\\t\\t54309\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (stark.starkcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"35.116.111.121\",\"IpPort\":\"54309\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680281807,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54309,
"vendorcode": "4680281807",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "35.116.111.121",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t35.116.111.121\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.116.111.121","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t35.116.111.121\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (stark.starkcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"35.116.111.121","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54309
vendorcode: 4680281807
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 35.116.111.121
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t101.87.122.133\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.87.122.133","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:27:15.252Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:27:16.489Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t101.87.122.133\\n\\tSource Port:\\t\\t54309\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"101.87.122.133\",\"IpPort\":\"54309\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680281807,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54309,
"vendorcode": "4680281807",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "101.87.122.133",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t101.87.122.133\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.87.122.133","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t101.87.122.133\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"101.87.122.133","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54309
vendorcode: 4680281807
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 101.87.122.133
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t22.55.192.238\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"22.55.192.238","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:27:15.252Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:27:16.489Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t22.55.192.238\\n\\tSource Port:\\t\\t54309\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"22.55.192.238\",\"IpPort\":\"54309\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680281807,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54309,
"vendorcode": "4680281807",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "22.55.192.238",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t22.55.192.238\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"22.55.192.238","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t22.55.192.238\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"22.55.192.238","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54309
vendorcode: 4680281807
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 22.55.192.238
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t72.36.14.75\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.36.14.75","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:27:15.252Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:27:16.489Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t72.36.14.75\\n\\tSource Port:\\t\\t54309\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (wayne.waynecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"72.36.14.75\",\"IpPort\":\"54309\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680281807,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54309,
"vendorcode": "4680281807",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "72.36.14.75",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t72.36.14.75\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.36.14.75","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t72.36.14.75\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"72.36.14.75","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54309
vendorcode: 4680281807
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 72.36.14.75
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t52.166.20.206\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"52.166.20.206","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:27:15.252Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:27:16.489Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t52.166.20.206\\n\\tSource Port:\\t\\t54309\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"52.166.20.206\",\"IpPort\":\"54309\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680281807,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54309,
"vendorcode": "4680281807",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "52.166.20.206",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t52.166.20.206\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"52.166.20.206","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t52.166.20.206\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"52.166.20.206","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54309
vendorcode: 4680281807
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 52.166.20.206
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t128.153.215.66\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.153.215.66","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:27:15.252Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:27:16.489Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t128.153.215.66\\n\\tSource Port:\\t\\t54309\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"128.153.215.66\",\"IpPort\":\"54309\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680281807,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54309,
"vendorcode": "4680281807",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "128.153.215.66",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t128.153.215.66\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.153.215.66","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:27:15.252Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:27:16.489Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t128.153.215.66\n\tSource Port:\t\t54309\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"128.153.215.66","IpPort":"54309","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680281807,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54309
vendorcode: 4680281807
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 128.153.215.66
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t131.48.12.17\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"131.48.12.17","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.150Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t131.48.12.17\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"131.48.12.17\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2368}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306818,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306818",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "131.48.12.17",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t131.48.12.17\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"131.48.12.17","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t131.48.12.17\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"131.48.12.17","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306818
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 131.48.12.17
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t102.147.154.139\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"102.147.154.139","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.150Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t102.147.154.139\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"102.147.154.139\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2368}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306818,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306818",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "102.147.154.139",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t102.147.154.139\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"102.147.154.139","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t102.147.154.139\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"102.147.154.139","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306818
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 102.147.154.139
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t139.58.74.3\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"139.58.74.3","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.150Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t139.58.74.3\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"139.58.74.3\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2368}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306818,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306818",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "139.58.74.3",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t139.58.74.3\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"139.58.74.3","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t139.58.74.3\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"139.58.74.3","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306818
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 139.58.74.3
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.57.2.158\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.57.2.158","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.150Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t115.57.2.158\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"115.57.2.158\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2368}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306818,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306818",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "115.57.2.158",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.57.2.158\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.57.2.158","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t115.57.2.158\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"115.57.2.158","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306818
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 115.57.2.158
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t177.29.212.29\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.29.212.29","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.150Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t177.29.212.29\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"177.29.212.29\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2368}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306818,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306818",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "177.29.212.29",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t177.29.212.29\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.29.212.29","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t177.29.212.29\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.29.212.29","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306818
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 177.29.212.29
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t253.210.159.70\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"253.210.159.70","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.150Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t253.210.159.70\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (wayne.waynecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"253.210.159.70\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2368}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306818,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306818",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "253.210.159.70",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t253.210.159.70\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"253.210.159.70","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.150Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t253.210.159.70\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (wayne.waynecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"253.210.159.70","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2368}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306818,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306818
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 253.210.159.70
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t14.153.11.2\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.153.11.2","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.144Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t14.153.11.2\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"14.153.11.2\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306815,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306815",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "14.153.11.2",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t14.153.11.2\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.153.11.2","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t14.153.11.2\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"14.153.11.2","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306815
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 14.153.11.2
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t20.62.47.160\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.62.47.160","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.144Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t20.62.47.160\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"20.62.47.160\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306815,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306815",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "20.62.47.160",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t20.62.47.160\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.62.47.160","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t20.62.47.160\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"20.62.47.160","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306815
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 20.62.47.160
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t150.74.248.56\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.74.248.56","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.144Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t150.74.248.56\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"150.74.248.56\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306815,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306815",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "150.74.248.56",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t150.74.248.56\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.74.248.56","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t150.74.248.56\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.74.248.56","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306815
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 150.74.248.56
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t50.63.28.222\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.63.28.222","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.144Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t50.63.28.222\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"50.63.28.222\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306815,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306815",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "50.63.28.222",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t50.63.28.222\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.63.28.222","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t50.63.28.222\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (umbrella.umbrellacloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.63.28.222","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306815
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 50.63.28.222
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t69.206.182.173\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.206.182.173","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.144Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t69.206.182.173\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"69.206.182.173\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306815,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306815",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "69.206.182.173",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t69.206.182.173\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.206.182.173","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t69.206.182.173\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"69.206.182.173","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306815
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 69.206.182.173
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t5.131.50.169\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"5.131.50.169","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"productids": [
6,
43,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-11-10T17:32:53.144Z\",\"agent\":{\"ephemeral_id\":\"170696ab-8e43-4fff-9dc6-54d7c3ea9287\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2022-11-10T17:32:54.694Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tDC1DRIVVE01\\n\\tSource Network Address:\\t5.131.50.169\\n\\tSource Port:\\t\\t54549\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"5.131.50.169\",\"IpPort\":\"54549\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"DC1DRIVVE01\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":2516}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4680306815,\"task\":\"Logon\"}}",
"sensitivity": "normal",
"messagetype": "auth_failure",
"clientport": 54549,
"vendorcode": "4680306815",
"action": "Logon",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "5.131.50.169",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t5.131.50.169\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"5.131.50.169","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-11-10T17:32:53.144Z","agent":{"ephemeral_id":"170696ab-8e43-4fff-9dc6-54d7c3ea9287","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2022-11-10T17:32:54.694Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tDC1DRIVVE01\n\tSource Network Address:\t5.131.50.169\n\tSource Port:\t\t54549\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"5.131.50.169","IpPort":"54549","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"DC1DRIVVE01"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":2516}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4680306815,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
productids: [6, 43, 0]
sourceinfo: unknown
sensitivity: normal
messagetype: auth_failure
clientport: 54549
vendorcode: 4680306815
action: Logon
streamName: microsoft-windows-security-auditing
clientIP: 5.131.50.169
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-10T14:02:19.639Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-10T14:02:20.292Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-6772\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x1CCBD9EE\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"activity_id":"{8E66BBBD-AC7B-0000-E0BB-668E7BACD801}","api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0x1ccbd9ee","SubjectUserName":"alice","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-6772"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":4240}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4185315658,"task":"Special Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4672",
"microsoft-windows-security-auditing",
"security_privilege_change"
],
"productids": [
43
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-08-10T14:02:19.639Z\",\"agent\":{\"ephemeral_id\":\"4943a2dd-eef2-412c-b496-8cc639fd9bc1\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-10T14:02:20.292Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-21-4204541585-151547883-1297828959-6772\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x1CCBD9EE\\n\\nPrivileges:\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\\n\\t\\t\\tSeEnableDelegationPrivilege\",\"organization\":\"CalPrivate (acme.acmecloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{8E66BBBD-AC7B-0000-E0BB-668E7BACD801}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"PrivilegeList\":\"SeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\\n\\t\\t\\tSeEnableDelegationPrivilege\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x1ccbd9ee\",\"SubjectUserName\":\"alice\",\"SubjectUserSid\":\"S-1-5-21-4204541585-151547883-1297828959-6772\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":4240}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4185315658,\"task\":\"Special Logon\"}}",
"sensitivity": "normal",
"messagetype": "security_privilege_change",
"vendorcode": "4185315658",
"action": "Special Logon",
"streamName": "microsoft-windows-security-auditing",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-10T14:02:19.639Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-10T14:02:20.292Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-6772\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x1CCBD9EE\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"activity_id":"{8E66BBBD-AC7B-0000-E0BB-668E7BACD801}","api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0x1ccbd9ee","SubjectUserName":"alice","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-6772"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":4240}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4185315658,"task":"Special Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-10T14:02:19.639Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-10T14:02:20.292Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-6772\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x1CCBD9EE\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (acme.acmecloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"activity_id":"{8E66BBBD-AC7B-0000-E0BB-668E7BACD801}","api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0x1ccbd9ee","SubjectUserName":"alice","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-6772"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":4240}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4185315658,"task":"Special Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
senderhost: 10.87.1.30
severitylabel: Info
tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change']
productids: [43]
sourceinfo: unknown
sensitivity: normal
messagetype: security_privilege_change
vendorcode: 4185315658
action: Special Logon
streamName: microsoft-windows-security-auditing
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2022-08-10T14:02:19.682Z","agent":{"ephemeral_id":"4943a2dd-eef2-412c-b496-8cc639fd9bc1","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-10T14:02:20.292Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-4204541585-151547883-1297828959-6772\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tSDPB\n\tLogon ID:\t\t0x1CCBDA62\n\nPrivileges:\t\tSeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","organization":"CalPrivate (oscorp.oscorpcloud.com)","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"PrivilegeList":"SeSecurityPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege\n\t\t\tSeEnableDelegationPrivilege","SubjectDomainName":"SDPB","SubjectLogonId":"0x1ccbda62","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-21-4204541585-151547883-1297828959-6772"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":732,"thread":{"id":2120}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":4185315668,"task":"Special Logon"}} | {
"senderhost": "10.87.1.30",
"severitylabel": "Info",
"tags": [
"v8",
"eventId:4672",
"microsoft-windows-security-auditing",
"security_privilege_change"
],
"productids": [
43
],
"sourceinfo": "unknown",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2022-08-10T14:02:19.682Z\",\"agent\":{\"ephemeral_id\":\"4943a2dd-eef2-412c-b496-8cc639fd9bc1\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-10T14:02:20.292Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-21-4204541585-151547883-1297828959-6772\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tSDPB\\n\\tLogon ID:\\t\\t0x1CCBDA62\\n\\nPrivileges:\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\\n\\t\\t\\tSeEnableDelegationPrivilege\",\"organization\":\"CalPrivate (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"PrivilegeList\":\"SeSecurityPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\\n\\t\\t\\tSeEnableDelegationPrivilege\",\"SubjectDomainName\":\"SDPB\",\"SubjectLogonId\":\"0x1ccbda62\",\"SubjectUserName\":\"nighthawk\",\"SubjectUserSid\":\"S-1-5-21-4204541585-151547883-1297828959-6772\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2120}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":4185315668,\"task\":\"Special Logon\"}}",
"sensitivity": "normal",
"messagetype": "security_privilege_change",
"vendorcode": "4185315668",
"action": "Special Logon",
"streamName": "microsoft-windows-security-auditing",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.