[ https://issues.apache.org/jira/browse/METRON-165?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
James Sirota updated METRON-165: -------------------------------- Labels: ParserExtension (was: ) > Create Windows Syslog Parser > ---------------------------- > > Key: METRON-165 > URL: https://issues.apache.org/jira/browse/METRON-165 > Project: Metron > Issue Type: New Feature > Reporter: Deeptaanshu Kumar > Labels: ParserExtension > > Create a parser for Windows Sylog. > Below are sample messages and their expected parsed output: > <13> ABC 02/05/2016 09:54:39 AM > LogName=Security > SourceName=Microsoft Windows security auditing. > EventCode=4624 > EventType=0 > Type=Information > ComputerName=ABC.google.com > TaskCategory=Logon > OpCode=Info > RecordNumber=112720121 > Keywords=Audit Success > Message=An account was successfully logged on. > Subject: > Security ID: NULL SID > Account Name: - > Account Domain: - > Logon ID: 0x0 > Logon Type: 3 > New Logon: > Security ID: ABC > Account Name: ABC > Account Domain: ABC > Logon ID: 0x4e149e04 > Logon GUID: {89C4AB77-51D6-D17B-3EAD-BC8676D1A4D2} > Process Information: > Process ID: 0x0 > Process Name: - > Network Information: > Workstation Name: > Source Network Address: 10.0.0.0 > Source Port: 64340 > Detailed Authentication Information: > Logon Process: Kerberos > Authentication Package: Kerberos > Transited Services: - > Package Name (NTLM only): - > Key Length: 0 > This event is generated when a logon session is created. It is generated on > the computer that was accessed. > The subject fields indicate the account on the local system which requested > the logon. This is most commonly a service such as the Server service, or a > local process such as Winlogon.exe or Services.exe. > The logon type field indicates the kind of logon that occurred. The most > common types are 2 (interactive) and 3 (network). > The New Logon fields indicate the account for whom the new logon was created, > i.e. the account that was logged on. > The network fields indicate where a remote logon request originated. > Workstation name is not always available and may be left blank in some cases. > The authentication information fields provide detailed information about this > specific logon request. > - Logon GUID is a unique identifier that can be used to correlate this > event with a KDC event. > - Transited services indicate which intermediate services have > participated in this logon request. > - Package name indicates which sub-protocol was used among the NTLM > protocols. > - Key length indicates the length of the generated session key. This > will be 0 if no session key was requested. > Here is the sample output: > {"computer_name":"ABC.google.com","keywords":"Audit > Success","log_name":"Security","record_number":"112720121","device_generated_timestamp":1454666079000,"source_type":"Windows > Syslog","message":"An account was successfully logged > on.\nSubject:\n\tSecurity ID:\t\tNULL SID\n\tAccount Name:\t\t-\n\tAccount > Domain:\t\t-\n\tLogon ID:\t\t0x0\nLogon Type:\t\t\t3\nNew Logon:\n\tSecurity > ID:\t\tABC\\ABC\n\tAccount Name:\t\tABC\n\tAccount Domain:\t\tABC\n\tLogon > ID:\t\t0x4e149e04\n\tLogon > GUID:\t\t{89C4AB77-51D6-D17B-3EAD-BC8676D1A4D2}\nProcess > Information:\n\tProcess ID:\t\t0x0\n\tProcess Name:\t\t-\nNetwork > Information:\n\tWorkstation Name:\t\n\tSource Network > Address:\t10.0.0.0\n\tSource Port:\t\t64340\nDetailed Authentication > Information:\n\tLogon Process:\t\tKerberos\n\tAuthentication > Package:\tKerberos\n\tTransited Services:\t-\n\tPackage Name (NTLM > only):\t-\n\tKey Length:\t\t0\nThis event is generated when a logon session > is created. It is generated on the computer that was accessed.\nThe subject > fields indicate the account on the local system which requested the logon. > This is most commonly a service such as the Server service, or a local > process such as Winlogon.exe or Services.exe.\nThe logon type field indicates > the kind of logon that occurred. The most common types are 2 (interactive) > and 3 (network).\nThe New Logon fields indicate the account for whom the new > logon was created, i.e. the account that was logged on.\nThe network fields > indicate where a remote logon request originated. Workstation name is not > always available and may be left blank in some cases.\nThe authentication > information fields provide detailed information about this specific logon > request.\n\t- Logon GUID is a unique identifier that can be used to correlate > this event with a KDC event.\n\t- Transited services indicate which > intermediate services have participated in this logon request.\n\t- Package > name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key > length indicates the length of the generated session key. This will be 0 if > no session key was > requested.\n","type":"Information","op_code":"Info","original_string":"<13> > BNY387S1 02\/05\/2016 09:54:39 AM\nLogName=Security\nSourceName=Microsoft > Windows security > auditing.\nEventCode=4624\nEventType=0\nType=Information\nComputerName=ABC.google.com\nTaskCategory=Logon\nOpCode=Info\nRecordNumber=112720121\nKeywords=Audit > Success\nMessage=An account was successfully logged > on.\nSubject:\n\tSecurity ID:\t\tNULL SID\n\tAccount Name:\t\t-\n\tAccount > Domain:\t\t-\n\tLogon ID:\t\t0x0\nLogon Type:\t\t\t3\nNew Logon:\n\tSecurity > ID:\t\tABC$\n\tAccount Name:\t\tABC\n\tAccount Domain:\t\tABC\n\tLogon > ID:\t\t0x4e149e04\n\tLogon > GUID:\t\t{89C4AB77-51D6-D17B-3EAD-BC8676D1A4D2}\nProcess > Information:\n\tProcess ID:\t\t0x0\n\tProcess Name:\t\t-\nNetwork > Information:\n\tWorkstation Name:\t\n\tSource Network > Address:\t10.136.56.211\n\tSource Port:\t\t64340\nDetailed Authentication > Information:\n\tLogon Process:\t\tKerberos\n\tAuthentication > Package:\tKerberos\n\tTransited Services:\t-\n\tPackage Name (NTLM > only):\t-\n\tKey Length:\t\t0\nThis event is generated when a logon session > is created. It is generated on the computer that was accessed.\nThe subject > fields indicate the account on the local system which requested the logon. > This is most commonly a service such as the Server service, or a local > process such as Winlogon.exe or Services.exe.\nThe logon type field indicates > the kind of logon that occurred. The most common types are 2 (interactive) > and 3 (network).\nThe New Logon fields indicate the account for whom the new > logon was created, i.e. the account that was logged on.\nThe network fields > indicate where a remote logon request originated. Workstation name is not > always available and may be left blank in some cases.\nThe authentication > information fields provide detailed information about this specific logon > request.\n\t- Logon GUID is a unique identifier that can be used to correlate > this event with a KDC event.\n\t- Transited services indicate which > intermediate services have participated in this logon request.\n\t- Package > name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key > length indicates the length of the generated session key. This will be 0 if > no session key was > requested.\n","event_type":"0","event_code":"4624","computer_name_simple":"ABC","ingest_timestamp":1463505709609,"task_category":"Logon","source_name":"Microsoft > Windows security auditing.","timestamp":1454666079000} -- This message was sent by Atlassian JIRA (v6.3.4#6332)