The events are sanitized.
XML in Windows Event Viewer:
- <System>
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
<EventID>5140</EventID>
<Version>1</Version>
<Level>0</Level>
<Task>12808</Task>
<Opcode>0</Opcode>
<Keywords>0x8020000000000000</Keywords>
<TimeCreated SystemTime="2017-02-15T07:43:12.062985000Z" />
<Correlation />
<Execution ProcessID="4" ThreadID="13920" />
<Channel>Security</Channel>
<Computer>Desktop</Computer>
<Security />
</System>
- <EventData>
<Data Name="SubjectUserSid">S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX</Data>
<Data Name="SubjectUserName">UserName</Data>
<Data Name="SubjectDomainName">DOMAIN</Data>
<Data Name="SubjectLogonId">0xXXXXXX</Data>
<Data Name="ObjectType">File</Data>
<Data Name="IpAddress">::1</Data>
<Data Name="IpPort">9723</Data>
<Data Name="ShareName">\\*\IPC$</Data>
<Data Name="ShareLocalPath" />
<Data Name="AccessMask">0x1</Data>
<Data Name="AccessList">%%4416</Data>
</EventData>
</Event>
Event in Text Format (from Windows Event Viewer):
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 2017-02-15 09:43:12
Event ID: 5140
Task Category: File Share
Level: Information
Keywords: Audit Success
User: N/A
Computer: Desktop
Description:
A network share object was accessed.
Subject:
Security ID: DOMAIN\UseName
Account Name: UserName
Account Domain: DOMAIN
Logon ID: 0xXXXXXX
Network Information:
Object Type: File
Source Address: ::1
Source Port: 9723
Share Information:
Share Name: \\*\IPC$
Share Path:
Access Request Information:
Access Mask: 0x1
Accesses: ReadData (or ListDirectory)
OSSEC Log Event (in json format):
{"rule":{"level":1,"comment":"Windows - A network share object was accessed.","sidid":182047,"firedtimes":3,"groups":["win_audit"],"PCI_DSS":["10.6.1"]},"dstuser":"(no user)","full_log":"2017 Feb 15 09:43:12 WinEvtLog: Security: AUDIT_SUCCESS(5140): Microsoft-Windows-Security-Auditing: (no user): no domain: Desktop: A network share object was accessed. Subject: Security ID: S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX Account Name: GJahchan Account Domain: DESKTOP Logon ID: 0xXXXXXX Network Information: Source Address: File Source Port: ::1 Share Name: 9723","id":"5140","status":"AUDIT_SUCCESS","data":"Microsoft-Windows-Security-Auditing","systemname":"Desktop","decoder":{"name":"windows"},"hostname":"Win10EntDsktp","agentip":"XXX.XXX.XX.X","timestamp":"2017 Feb 15 07:43:12","location":"WinEvtLog"}
OSSEC Log Event (in multi-line log format):
2017 Feb 15 09:43:12 WinEvtLog: Security: AUDIT_SUCCESS(5140): Microsoft-Windows-Security-Auditing: (no user): no domain: Desktop: A network share object was accessed. Subject: Security ID: S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX Account Name: UserName Account Domain: DOMAIN Logon ID: 0xXXXXXX Network Information: Source Address: File Source Port: ::1 Share Name: 9723
Corresponding Custom Rule:
<rule id="182047" level="1">
<if_sid>18104</if_sid>
<id>^5140$</id>
<description>Windows - A network share object was accessed.</description>
<group>pci_dss_10.6.1,</group>
</rule>
Issues:
The Source Address field is skipped, the Source Port is filled with the Source Address, the Share Name is filled with the Source Port.
Share Name, Access Mask and Accesses fields are missing.