input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=128.103.41.159 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.183.52.15 spt=53876 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication="Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.183.52.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=128.103.41.159 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.183.52.15 spt=53876 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication="Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.183.52.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53876
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg
localhostname: WAFirewall
localstarttime: 1694388472700
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:122.225.130.85', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 169.183.52.15
serverIP: 128.103.41.159
userName: -
|
Explain this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=34.192.207.50 dst=98.160.42.145 protocol=tcp sport=57677 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57677,
"message": "<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=34.192.207.50 dst=98.160.42.145 protocol=tcp sport=57677 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "34.192.207.50",
"serverIP": "98.160.42.145"
}
|
Create a JSON artifact from the message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=34.192.207.50 dst=98.160.42.145 protocol=tcp sport=57677 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=34.192.207.50 dst=98.160.42.145 protocol=tcp sport=57677 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57677
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 34.192.207.50
serverIP: 98.160.42.145
|
Explain this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=246.240.137.44 dst=51.214.59.45 protocol=tcp sport=57677 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57677,
"message": "<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=246.240.137.44 dst=51.214.59.45 protocol=tcp sport=57677 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "246.240.137.44",
"serverIP": "51.214.59.45"
}
|
Create a JSON artifact from the message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=246.240.137.44 dst=51.214.59.45 protocol=tcp sport=57677 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=246.240.137.44 dst=51.214.59.45 protocol=tcp sport=57677 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57677
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 246.240.137.44
serverIP: 51.214.59.45
|
Explain this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=241.139.169.165 dst=218.116.81.11 protocol=tcp sport=57677 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57677,
"message": "<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=241.139.169.165 dst=218.116.81.11 protocol=tcp sport=57677 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "241.139.169.165",
"serverIP": "218.116.81.11"
}
|
Create a JSON artifact from the message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=241.139.169.165 dst=218.116.81.11 protocol=tcp sport=57677 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=241.139.169.165 dst=218.116.81.11 protocol=tcp sport=57677 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57677
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 241.139.169.165
serverIP: 218.116.81.11
|
Explain this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=84.0.31.190 dst=67.10.103.162 protocol=tcp sport=57677 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 57677,
"message": "<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=84.0.31.190 dst=67.10.103.162 protocol=tcp sport=57677 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "84.0.31.190",
"serverIP": "67.10.103.162"
}
|
Create a JSON artifact from the message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=84.0.31.190 dst=67.10.103.162 protocol=tcp sport=57677 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=174.68.214.235 1 1686360435.617978227 M41_MX67C_Macon l7_firewall src=84.0.31.190 dst=67.10.103.162 protocol=tcp sport=57677 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57677
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 84.0.31.190
serverIP: 67.10.103.162
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"185.12.114.197","externalIp":"228.200.140.222","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=185.12.114.197 ::: serverIP=228.200.140.222 ::: userName=johndoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T15:56:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={\"originId\":410613908,\"originType\":\"AD Users\",\"internalIp\":\"185.12.114.197\",\"externalIp\":\"228.200.140.222\",\"categories\":[\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"object.fm\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T15:56:25.000Z\"} ::: clientIP=185.12.114.197 ::: serverIP=228.200.140.222 ::: userName=johndoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "object.fm",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "object.fm",
"vendorcode": "MalwareWeb Hosting",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "185.12.114.197",
"serverIP": "228.200.140.222",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"185.12.114.197","externalIp":"228.200.140.222","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=185.12.114.197 ::: serverIP=228.200.140.222 ::: userName=johndoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"185.12.114.197","externalIp":"228.200.140.222","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=185.12.114.197 ::: serverIP=228.200.140.222 ::: userName=johndoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T15:56:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: object.fm
messagetype: firewall_action
severitycode: 2
fqdn: object.fm
vendorcode: MalwareWeb Hosting
action: block
streamName: OpenDNS Detection
clientIP: 185.12.114.197
serverIP: 228.200.140.222
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"223.76.24.116","externalIp":"164.56.252.106","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=223.76.24.116 ::: serverIP=164.56.252.106 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T15:56:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={\"originId\":410613908,\"originType\":\"AD Users\",\"internalIp\":\"223.76.24.116\",\"externalIp\":\"164.56.252.106\",\"categories\":[\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"object.fm\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T15:56:25.000Z\"} ::: clientIP=223.76.24.116 ::: serverIP=164.56.252.106 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "object.fm",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "object.fm",
"vendorcode": "MalwareWeb Hosting",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "223.76.24.116",
"serverIP": "164.56.252.106",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"223.76.24.116","externalIp":"164.56.252.106","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=223.76.24.116 ::: serverIP=164.56.252.106 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"223.76.24.116","externalIp":"164.56.252.106","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=223.76.24.116 ::: serverIP=164.56.252.106 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T15:56:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: object.fm
messagetype: firewall_action
severitycode: 2
fqdn: object.fm
vendorcode: MalwareWeb Hosting
action: block
streamName: OpenDNS Detection
clientIP: 223.76.24.116
serverIP: 164.56.252.106
userName: alice
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"18.120.135.0","externalIp":"235.113.68.77","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=18.120.135.0 ::: serverIP=235.113.68.77 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T15:56:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={\"originId\":410613908,\"originType\":\"AD Users\",\"internalIp\":\"18.120.135.0\",\"externalIp\":\"235.113.68.77\",\"categories\":[\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"object.fm\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T15:56:25.000Z\"} ::: clientIP=18.120.135.0 ::: serverIP=235.113.68.77 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "object.fm",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "object.fm",
"vendorcode": "MalwareWeb Hosting",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "18.120.135.0",
"serverIP": "235.113.68.77",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"18.120.135.0","externalIp":"235.113.68.77","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=18.120.135.0 ::: serverIP=235.113.68.77 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"18.120.135.0","externalIp":"235.113.68.77","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=18.120.135.0 ::: serverIP=235.113.68.77 ::: userName=alice ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T15:56:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: object.fm
messagetype: firewall_action
severitycode: 2
fqdn: object.fm
vendorcode: MalwareWeb Hosting
action: block
streamName: OpenDNS Detection
clientIP: 18.120.135.0
serverIP: 235.113.68.77
userName: alice
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"33.73.189.244","externalIp":"157.107.172.33","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=33.73.189.244 ::: serverIP=157.107.172.33 ::: userName=fish ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T15:56:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={\"originId\":410613908,\"originType\":\"AD Users\",\"internalIp\":\"33.73.189.244\",\"externalIp\":\"157.107.172.33\",\"categories\":[\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"object.fm\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T15:56:25.000Z\"} ::: clientIP=33.73.189.244 ::: serverIP=157.107.172.33 ::: userName=fish ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "object.fm",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "object.fm",
"vendorcode": "MalwareWeb Hosting",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "33.73.189.244",
"serverIP": "157.107.172.33",
"userName": "fish"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"33.73.189.244","externalIp":"157.107.172.33","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=33.73.189.244 ::: serverIP=157.107.172.33 ::: userName=fish ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"33.73.189.244","externalIp":"157.107.172.33","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=33.73.189.244 ::: serverIP=157.107.172.33 ::: userName=fish ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T15:56:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: object.fm
messagetype: firewall_action
severitycode: 2
fqdn: object.fm
vendorcode: MalwareWeb Hosting
action: block
streamName: OpenDNS Detection
clientIP: 33.73.189.244
serverIP: 157.107.172.33
userName: fish
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"116.62.6.127","externalIp":"97.40.34.93","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=116.62.6.127 ::: serverIP=97.40.34.93 ::: userName=janedoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T15:56:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={\"originId\":410613908,\"originType\":\"AD Users\",\"internalIp\":\"116.62.6.127\",\"externalIp\":\"97.40.34.93\",\"categories\":[\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"object.fm\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T15:56:25.000Z\"} ::: clientIP=116.62.6.127 ::: serverIP=97.40.34.93 ::: userName=janedoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "object.fm",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "object.fm",
"vendorcode": "MalwareWeb Hosting",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "116.62.6.127",
"serverIP": "97.40.34.93",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"116.62.6.127","externalIp":"97.40.34.93","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=116.62.6.127 ::: serverIP=97.40.34.93 ::: userName=janedoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"116.62.6.127","externalIp":"97.40.34.93","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=116.62.6.127 ::: serverIP=97.40.34.93 ::: userName=janedoe ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T15:56:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: object.fm
messagetype: firewall_action
severitycode: 2
fqdn: object.fm
vendorcode: MalwareWeb Hosting
action: block
streamName: OpenDNS Detection
clientIP: 116.62.6.127
serverIP: 97.40.34.93
userName: janedoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"165.193.33.118","externalIp":"48.219.28.173","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=165.193.33.118 ::: serverIP=48.219.28.173 ::: userName=bob ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T15:56:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={\"originId\":410613908,\"originType\":\"AD Users\",\"internalIp\":\"165.193.33.118\",\"externalIp\":\"48.219.28.173\",\"categories\":[\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"object.fm\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T15:56:25.000Z\"} ::: clientIP=165.193.33.118 ::: serverIP=48.219.28.173 ::: userName=bob ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "object.fm",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "object.fm",
"vendorcode": "MalwareWeb Hosting",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "165.193.33.118",
"serverIP": "48.219.28.173",
"userName": "bob"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"165.193.33.118","externalIp":"48.219.28.173","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=165.193.33.118 ::: serverIP=48.219.28.173 ::: userName=bob ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=object.fm ::: action=BLOCKED ::: message={"originId":410613908,"originType":"AD Users","internalIp":"165.193.33.118","externalIp":"48.219.28.173","categories":["Malware","Web Hosting"],"tags":[],"destination":"object.fm","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-20T15:56:25.000Z"} ::: clientIP=165.193.33.118 ::: serverIP=48.219.28.173 ::: userName=bob ::: created_at=2023-01-20T15:56:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T15:56:25.000Z ::: serverHostname=object.fm ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T15:56:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: object.fm
messagetype: firewall_action
severitycode: 2
fqdn: object.fm
vendorcode: MalwareWeb Hosting
action: block
streamName: OpenDNS Detection
clientIP: 165.193.33.118
serverIP: 48.219.28.173
userName: bob
|
Explain this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=167.108.74.1 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=121.88.4.186 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.88.4.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=167.108.74.1 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=121.88.4.186 spt=49666 requestMethod=POST app=HTTP requestContext=\"-\" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.88.4.186 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660418506213 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"severitycode": 9,
"fqdn": "/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh",
"clientport": 49666,
"vendorcode": "16",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "121.88.4.186",
"serverIP": "167.108.74.1",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=167.108.74.1 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=121.88.4.186 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.88.4.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=167.108.74.1 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=121.88.4.186 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.88.4.186 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf']
productids: [0]
sourceinfo: unknown
localstarttime: 1660418506213
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT
severitycode: 9
fqdn: /cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh
clientport: 49666
vendorcode: 16
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 121.88.4.186
serverIP: 167.108.74.1
userName: -
|
Explain this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=78.253.67.128 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=142.55.42.92 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=142.55.42.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=78.253.67.128 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=142.55.42.92 spt=49666 requestMethod=POST app=HTTP requestContext=\"-\" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=142.55.42.92 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660418506213 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"severitycode": 9,
"fqdn": "/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh",
"clientport": 49666,
"vendorcode": "16",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "142.55.42.92",
"serverIP": "78.253.67.128",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=78.253.67.128 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=142.55.42.92 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=142.55.42.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=78.253.67.128 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=142.55.42.92 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=142.55.42.92 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf']
productids: [0]
sourceinfo: unknown
localstarttime: 1660418506213
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT
severitycode: 9
fqdn: /cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh
clientport: 49666
vendorcode: 16
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 142.55.42.92
serverIP: 78.253.67.128
userName: -
|
Explain this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=89.10.162.225 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=3.61.253.200 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.61.253.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=89.10.162.225 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=3.61.253.200 spt=49666 requestMethod=POST app=HTTP requestContext=\"-\" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.61.253.200 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660418506213 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"severitycode": 9,
"fqdn": "/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh",
"clientport": 49666,
"vendorcode": "16",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "3.61.253.200",
"serverIP": "89.10.162.225",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=89.10.162.225 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=3.61.253.200 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.61.253.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=89.10.162.225 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=3.61.253.200 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.61.253.200 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf']
productids: [0]
sourceinfo: unknown
localstarttime: 1660418506213
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT
severitycode: 9
fqdn: /cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh
clientport: 49666
vendorcode: 16
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 3.61.253.200
serverIP: 89.10.162.225
userName: -
|
Explain this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=187.188.226.148 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=235.234.92.143 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.234.92.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"barracuda_waf"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=187.188.226.148 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser=\"-\" src=235.234.92.143 spt=49666 requestMethod=POST app=HTTP requestContext=\"-\" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.234.92.143 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660418506213 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "DIRECTORY_TRAVERSAL_BEYOND_ROOT",
"severitycode": 9,
"fqdn": "/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh",
"clientport": 49666,
"vendorcode": "16",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "235.234.92.143",
"serverIP": "187.188.226.148",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=187.188.226.148 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=235.234.92.143 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.234.92.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:21:46 WAFirewall CEF:0|Barracuda|WAF|1101|16|DIRECTORY_TRAVERSAL_BEYOND_ROOT|1|cat=WF dst=187.188.226.148 dpt=80 act=DENY msg=[Invalid directory traversal attempted] duser="-" src=235.234.92.143 spt=49666 requestMethod=POST app=HTTP requestContext="-" start=Aug 13 2022 14:21:46 rt=1660418506213 request=/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=18298a7bde5-ba56e800 cn2=49666 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=235.234.92.143 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf_DIRECTORY_TRAVERSAL_BEYOND_ROOT', 'barracuda_waf']
productids: [0]
sourceinfo: unknown
localstarttime: 1660418506213
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: DIRECTORY_TRAVERSAL_BEYOND_ROOT
severitycode: 9
fqdn: /cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh
clientport: 49666
vendorcode: 16
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 235.234.92.143
serverIP: 187.188.226.148
userName: -
|
Explain this syslog message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=62.61.105.188 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.237.49.221 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.237.49.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=62.61.105.188 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=247.237.49.221 spt=58318 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.237.49.221 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660417980317 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 58318,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "247.237.49.221",
"serverIP": "62.61.105.188",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=62.61.105.188 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.237.49.221 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.237.49.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=62.61.105.188 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=247.237.49.221 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=247.237.49.221 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1660417980317
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 58318
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 247.237.49.221
serverIP: 62.61.105.188
userName: -
|
Explain this syslog message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=91.158.6.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=240.94.77.162 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.94.77.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=91.158.6.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=240.94.77.162 spt=58318 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.94.77.162 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660417980317 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 58318,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "240.94.77.162",
"serverIP": "91.158.6.173",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=91.158.6.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=240.94.77.162 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.94.77.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=91.158.6.173 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=240.94.77.162 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=240.94.77.162 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1660417980317
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 58318
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 240.94.77.162
serverIP: 91.158.6.173
userName: -
|
Explain this syslog message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=245.165.177.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=15.75.23.74 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=15.75.23.74 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"ProxyIP:185.7.214.117",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=245.165.177.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=15.75.23.74 spt=58318 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36\" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=15.75.23.74 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1660417980317 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 58318,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "15.75.23.74",
"serverIP": "245.165.177.149",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=245.165.177.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=15.75.23.74 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=15.75.23.74 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Aug 13 14:13:00 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=245.165.177.149 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=15.75.23.74 spt=58318 requestMethod=GET app=HTTP requestContext="-" start=Aug 13 2022 14:13:00 rt=1660417980317 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" dvchost=WAFirewall externalId=182989fb79d-ee8ed6c8 cn2=58318 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=15.75.23.74 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'ProxyIP:185.7.214.117', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1660417980317
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 58318
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 15.75.23.74
serverIP: 245.165.177.149
userName: -
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.194.12 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"195.119.114.223","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.209.194.12","key":"DPTEUAQCH3MZU6K98V9F","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"931-607-7821"},"email":"alice@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:31:44.535559+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675348304,"txid":"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUH9FU08T0BV26SE0R1W","name":"alice"}} ::: program=null ::: clientIP=195.119.114.223 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675348304",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.209.194.12",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.209.194.12 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"195.119.114.223\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"174.209.194.12\",\"key\":\"DPTEUAQCH3MZU6K98V9F\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"931-607-7821\"},\"email\":\"alice@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:31:44.535559+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675348304,\"txid\":\"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUH9FU08T0BV26SE0R1W\",\"name\":\"alice\"}} ::: program=null ::: clientIP=195.119.114.223 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "195.119.114.223",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.194.12 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"195.119.114.223","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.209.194.12","key":"DPTEUAQCH3MZU6K98V9F","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"931-607-7821"},"email":"alice@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:31:44.535559+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675348304,"txid":"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUH9FU08T0BV26SE0R1W","name":"alice"}} ::: program=null ::: clientIP=195.119.114.223 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.194.12 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"195.119.114.223","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.209.194.12","key":"DPTEUAQCH3MZU6K98V9F","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"931-607-7821"},"email":"alice@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:31:44.535559+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675348304,"txid":"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUH9FU08T0BV26SE0R1W","name":"alice"}} ::: program=null ::: clientIP=195.119.114.223 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675348304
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.209.194.12
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 195.119.114.223
userName: alice
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.194.12 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"211.38.112.94","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.209.194.12","key":"DPTEUAQCH3MZU6K98V9F","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"931-607-7821"},"email":"alice@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:31:44.535559+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675348304,"txid":"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUH9FU08T0BV26SE0R1W","name":"alice"}} ::: program=null ::: clientIP=211.38.112.94 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675348304",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.209.194.12",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.209.194.12 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"211.38.112.94\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"174.209.194.12\",\"key\":\"DPTEUAQCH3MZU6K98V9F\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"931-607-7821\"},\"email\":\"alice@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:31:44.535559+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675348304,\"txid\":\"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUH9FU08T0BV26SE0R1W\",\"name\":\"alice\"}} ::: program=null ::: clientIP=211.38.112.94 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "211.38.112.94",
"userName": "alice"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.194.12 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"211.38.112.94","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.209.194.12","key":"DPTEUAQCH3MZU6K98V9F","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"931-607-7821"},"email":"alice@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:31:44.535559+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675348304,"txid":"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUH9FU08T0BV26SE0R1W","name":"alice"}} ::: program=null ::: clientIP=211.38.112.94 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.209.194.12 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"211.38.112.94","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.209.194.12","key":"DPTEUAQCH3MZU6K98V9F","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"931-607-7821"},"email":"alice@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:31:44.535559+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675348304,"txid":"5adb5ae4-14fa-4020-929d-8e5e1d2dbafd","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUH9FU08T0BV26SE0R1W","name":"alice"}} ::: program=null ::: clientIP=211.38.112.94 ::: userName=alice ::: created_at=1675348304 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348304 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675348304
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.209.194.12
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 211.38.112.94
userName: alice
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"229.108.134.186","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"janedoe@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:33.163725+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347273,"txid":"d173d5cf-6b47-4edb-817c-c07ac58fc47f","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"janedoe"}} ::: program=null ::: clientIP=229.108.134.186 ::: userName=janedoe ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675347273",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "75.35.37.124",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.35.37.124 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"229.108.134.186\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.35.37.124\",\"key\":\"DP0WDEGU0HUW221N30O1\",\"location\":{\"city\":\"Dacula\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-906-9330\"},\"email\":\"janedoe@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:14:33.163725+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675347273,\"txid\":\"d173d5cf-6b47-4edb-817c-c07ac58fc47f\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU82DCAJRRVMA748MC9E\",\"name\":\"janedoe\"}} ::: program=null ::: clientIP=229.108.134.186 ::: userName=janedoe ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "229.108.134.186",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"229.108.134.186","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"janedoe@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:33.163725+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347273,"txid":"d173d5cf-6b47-4edb-817c-c07ac58fc47f","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"janedoe"}} ::: program=null ::: clientIP=229.108.134.186 ::: userName=janedoe ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"229.108.134.186","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"janedoe@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:33.163725+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347273,"txid":"d173d5cf-6b47-4edb-817c-c07ac58fc47f","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"janedoe"}} ::: program=null ::: clientIP=229.108.134.186 ::: userName=janedoe ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675347273
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 75.35.37.124
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 229.108.134.186
userName: janedoe
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"238.174.11.72","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"charlie@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:33.163725+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347273,"txid":"d173d5cf-6b47-4edb-817c-c07ac58fc47f","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"charlie"}} ::: program=null ::: clientIP=238.174.11.72 ::: userName=charlie ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675347273",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "75.35.37.124",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.35.37.124 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"238.174.11.72\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.35.37.124\",\"key\":\"DP0WDEGU0HUW221N30O1\",\"location\":{\"city\":\"Dacula\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-906-9330\"},\"email\":\"charlie@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:14:33.163725+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675347273,\"txid\":\"d173d5cf-6b47-4edb-817c-c07ac58fc47f\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU82DCAJRRVMA748MC9E\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=238.174.11.72 ::: userName=charlie ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "238.174.11.72",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"238.174.11.72","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"charlie@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:33.163725+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347273,"txid":"d173d5cf-6b47-4edb-817c-c07ac58fc47f","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"charlie"}} ::: program=null ::: clientIP=238.174.11.72 ::: userName=charlie ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"238.174.11.72","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"charlie@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:33.163725+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347273,"txid":"d173d5cf-6b47-4edb-817c-c07ac58fc47f","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"charlie"}} ::: program=null ::: clientIP=238.174.11.72 ::: userName=charlie ::: created_at=1675347273 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347273 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675347273
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 75.35.37.124
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 238.174.11.72
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.215.176.78 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"34.172.153.235","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.215.176.78","key":"DPDJMCC567D7B0MO8JVE","location":{"city":null,"country":"United States","state":"Georgia"},"name":"678-896-6907"},"email":"johndoe@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:15:31.766203+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347331,"txid":"82659644-6e0e-45e3-8dde-4b2f8e2cea35","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHAALH84TQQM6JU15N5","name":"johndoe"}} ::: program=null ::: clientIP=34.172.153.235 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675347331",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.215.176.78",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.215.176.78 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"34.172.153.235\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"174.215.176.78\",\"key\":\"DPDJMCC567D7B0MO8JVE\",\"location\":{\"city\":null,\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-896-6907\"},\"email\":\"johndoe@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:15:31.766203+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675347331,\"txid\":\"82659644-6e0e-45e3-8dde-4b2f8e2cea35\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUHAALH84TQQM6JU15N5\",\"name\":\"johndoe\"}} ::: program=null ::: clientIP=34.172.153.235 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "34.172.153.235",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.215.176.78 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"34.172.153.235","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.215.176.78","key":"DPDJMCC567D7B0MO8JVE","location":{"city":null,"country":"United States","state":"Georgia"},"name":"678-896-6907"},"email":"johndoe@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:15:31.766203+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347331,"txid":"82659644-6e0e-45e3-8dde-4b2f8e2cea35","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHAALH84TQQM6JU15N5","name":"johndoe"}} ::: program=null ::: clientIP=34.172.153.235 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.215.176.78 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"34.172.153.235","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.215.176.78","key":"DPDJMCC567D7B0MO8JVE","location":{"city":null,"country":"United States","state":"Georgia"},"name":"678-896-6907"},"email":"johndoe@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:15:31.766203+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347331,"txid":"82659644-6e0e-45e3-8dde-4b2f8e2cea35","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHAALH84TQQM6JU15N5","name":"johndoe"}} ::: program=null ::: clientIP=34.172.153.235 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675347331
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.215.176.78
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 34.172.153.235
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.215.176.78 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.120.135.70","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.215.176.78","key":"DPDJMCC567D7B0MO8JVE","location":{"city":null,"country":"United States","state":"Georgia"},"name":"678-896-6907"},"email":"johndoe@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:15:31.766203+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347331,"txid":"82659644-6e0e-45e3-8dde-4b2f8e2cea35","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHAALH84TQQM6JU15N5","name":"johndoe"}} ::: program=null ::: clientIP=157.120.135.70 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675347331",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "174.215.176.78",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=174.215.176.78 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"157.120.135.70\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"174.215.176.78\",\"key\":\"DPDJMCC567D7B0MO8JVE\",\"location\":{\"city\":null,\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-896-6907\"},\"email\":\"johndoe@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:15:31.766203+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675347331,\"txid\":\"82659644-6e0e-45e3-8dde-4b2f8e2cea35\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUHAALH84TQQM6JU15N5\",\"name\":\"johndoe\"}} ::: program=null ::: clientIP=157.120.135.70 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "157.120.135.70",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.215.176.78 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.120.135.70","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.215.176.78","key":"DPDJMCC567D7B0MO8JVE","location":{"city":null,"country":"United States","state":"Georgia"},"name":"678-896-6907"},"email":"johndoe@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:15:31.766203+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347331,"txid":"82659644-6e0e-45e3-8dde-4b2f8e2cea35","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHAALH84TQQM6JU15N5","name":"johndoe"}} ::: program=null ::: clientIP=157.120.135.70 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=174.215.176.78 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.120.135.70","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"174.215.176.78","key":"DPDJMCC567D7B0MO8JVE","location":{"city":null,"country":"United States","state":"Georgia"},"name":"678-896-6907"},"email":"johndoe@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:15:31.766203+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347331,"txid":"82659644-6e0e-45e3-8dde-4b2f8e2cea35","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUHAALH84TQQM6JU15N5","name":"johndoe"}} ::: program=null ::: clientIP=157.120.135.70 ::: userName=johndoe ::: created_at=1675347331 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347331 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675347331
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 174.215.176.78
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 157.120.135.70
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=denied","reason=no_response"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"92.17.163.170","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DP92QC68KUWE1PYF1IU0","location":{"city":null,"country":null,"state":null},"name":"256-679-0849"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:27:46.019100+00:00","ood_software":null,"reason":"no_response","result":"denied","timestamp":1675348066,"txid":"338c4ce6-c1b1-463c-9ba3-84df63f6817c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4GLEH6GL766FXUDW0C","name":"charlie"}} ::: program=null ::: clientIP=92.17.163.170 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675348066",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=denied\",\"reason=no_response\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"92.17.163.170\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Novel Access IP\",\"trust_level\":\"LOW\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":\"DP92QC68KUWE1PYF1IU0\",\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"256-679-0849\"},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:27:46.019100+00:00\",\"ood_software\":null,\"reason\":\"no_response\",\"result\":\"denied\",\"timestamp\":1675348066,\"txid\":\"338c4ce6-c1b1-463c-9ba3-84df63f6817c\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU4GLEH6GL766FXUDW0C\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=92.17.163.170 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "92.17.163.170",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=denied","reason=no_response"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"92.17.163.170","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DP92QC68KUWE1PYF1IU0","location":{"city":null,"country":null,"state":null},"name":"256-679-0849"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:27:46.019100+00:00","ood_software":null,"reason":"no_response","result":"denied","timestamp":1675348066,"txid":"338c4ce6-c1b1-463c-9ba3-84df63f6817c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4GLEH6GL766FXUDW0C","name":"charlie"}} ::: program=null ::: clientIP=92.17.163.170 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=denied","reason=no_response"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"92.17.163.170","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DP92QC68KUWE1PYF1IU0","location":{"city":null,"country":null,"state":null},"name":"256-679-0849"},"email":"charlie@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:27:46.019100+00:00","ood_software":null,"reason":"no_response","result":"denied","timestamp":1675348066,"txid":"338c4ce6-c1b1-463c-9ba3-84df63f6817c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4GLEH6GL766FXUDW0C","name":"charlie"}} ::: program=null ::: clientIP=92.17.163.170 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675348066
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 92.17.163.170
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=denied","reason=no_response"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"117.235.73.15","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DP92QC68KUWE1PYF1IU0","location":{"city":null,"country":null,"state":null},"name":"256-679-0849"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:27:46.019100+00:00","ood_software":null,"reason":"no_response","result":"denied","timestamp":1675348066,"txid":"338c4ce6-c1b1-463c-9ba3-84df63f6817c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4GLEH6GL766FXUDW0C","name":"charlie"}} ::: program=null ::: clientIP=117.235.73.15 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675348066",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=denied\",\"reason=no_response\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"117.235.73.15\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Novel Access IP\",\"trust_level\":\"LOW\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":\"DP92QC68KUWE1PYF1IU0\",\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":\"256-679-0849\"},\"email\":\"charlie@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:27:46.019100+00:00\",\"ood_software\":null,\"reason\":\"no_response\",\"result\":\"denied\",\"timestamp\":1675348066,\"txid\":\"338c4ce6-c1b1-463c-9ba3-84df63f6817c\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU4GLEH6GL766FXUDW0C\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=117.235.73.15 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "117.235.73.15",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=denied","reason=no_response"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"117.235.73.15","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DP92QC68KUWE1PYF1IU0","location":{"city":null,"country":null,"state":null},"name":"256-679-0849"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:27:46.019100+00:00","ood_software":null,"reason":"no_response","result":"denied","timestamp":1675348066,"txid":"338c4ce6-c1b1-463c-9ba3-84df63f6817c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4GLEH6GL766FXUDW0C","name":"charlie"}} ::: program=null ::: clientIP=117.235.73.15 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=denied","reason=no_response"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"117.235.73.15","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":"DP92QC68KUWE1PYF1IU0","location":{"city":null,"country":null,"state":null},"name":"256-679-0849"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:27:46.019100+00:00","ood_software":null,"reason":"no_response","result":"denied","timestamp":1675348066,"txid":"338c4ce6-c1b1-463c-9ba3-84df63f6817c","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU4GLEH6GL766FXUDW0C","name":"charlie"}} ::: program=null ::: clientIP=117.235.73.15 ::: userName=charlie ::: created_at=1675348066 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675348066 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675348066
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 117.235.73.15
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"153.147.8.243","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:21.171301+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347261,"txid":"cb00d097-78d9-4199-ac98-fec8a23f377b","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"charlie"}} ::: program=null ::: clientIP=153.147.8.243 ::: userName=charlie ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675347261",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "75.35.37.124",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.35.37.124 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"153.147.8.243\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.35.37.124\",\"key\":\"DP0WDEGU0HUW221N30O1\",\"location\":{\"city\":\"Dacula\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-906-9330\"},\"email\":\"charlie@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:14:21.171301+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675347261,\"txid\":\"cb00d097-78d9-4199-ac98-fec8a23f377b\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU82DCAJRRVMA748MC9E\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=153.147.8.243 ::: userName=charlie ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "153.147.8.243",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"153.147.8.243","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:21.171301+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347261,"txid":"cb00d097-78d9-4199-ac98-fec8a23f377b","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"charlie"}} ::: program=null ::: clientIP=153.147.8.243 ::: userName=charlie ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"153.147.8.243","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"charlie@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:21.171301+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347261,"txid":"cb00d097-78d9-4199-ac98-fec8a23f377b","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"charlie"}} ::: program=null ::: clientIP=153.147.8.243 ::: userName=charlie ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675347261
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 75.35.37.124
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 153.147.8.243
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"156.227.189.21","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"nighthawk@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:21.171301+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347261,"txid":"cb00d097-78d9-4199-ac98-fec8a23f377b","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"nighthawk"}} ::: program=null ::: clientIP=156.227.189.21 ::: userName=nighthawk ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
{
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1675347261",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "75.35.37.124",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS02",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.35.37.124 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS02\",\"ip\":\"156.227.189.21\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.35.37.124\",\"key\":\"DP0WDEGU0HUW221N30O1\",\"location\":{\"city\":\"Dacula\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"678-906-9330\"},\"email\":\"nighthawk@oscorp.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-02T14:14:21.171301+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1675347261,\"txid\":\"cb00d097-78d9-4199-ac98-fec8a23f377b\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU82DCAJRRVMA748MC9E\",\"name\":\"nighthawk\"}} ::: program=null ::: clientIP=156.227.189.21 ::: userName=nighthawk ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "156.227.189.21",
"userName": "nighthawk"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"156.227.189.21","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"nighthawk@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:21.171301+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347261,"txid":"cb00d097-78d9-4199-ac98-fec8a23f377b","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"nighthawk"}} ::: program=null ::: clientIP=156.227.189.21 ::: userName=nighthawk ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.35.37.124 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS02","ip":"156.227.189.21","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.35.37.124","key":"DP0WDEGU0HUW221N30O1","location":{"city":"Dacula","country":"United States","state":"Georgia"},"name":"678-906-9330"},"email":"nighthawk@oscorp.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-02T14:14:21.171301+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1675347261,"txid":"cb00d097-78d9-4199-ac98-fec8a23f377b","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU82DCAJRRVMA748MC9E","name":"nighthawk"}} ::: program=null ::: clientIP=156.227.189.21 ::: userName=nighthawk ::: created_at=1675347261 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1675347261 ::: clientHostname=TS02 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1675347261
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 75.35.37.124
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS02
streamName: DUO
clientIP: 156.227.189.21
userName: nighthawk
|
Explain this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=70.219.7.21 dst=166.60.216.27 protocol=tcp sport=51188 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=70.219.7.21 dst=166.60.216.27 protocol=tcp sport=51188 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51188,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "70.219.7.21",
"serverIP": "166.60.216.27"
}
|
Create a JSON artifact from the message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=70.219.7.21 dst=166.60.216.27 protocol=tcp sport=51188 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=70.219.7.21 dst=166.60.216.27 protocol=tcp sport=51188 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51188
protocol: 6
streamName: meraki_l7_firewall
clientIP: 70.219.7.21
serverIP: 166.60.216.27
|
Explain this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=206.214.130.211 dst=218.49.174.47 protocol=tcp sport=51188 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=206.214.130.211 dst=218.49.174.47 protocol=tcp sport=51188 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51188,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "206.214.130.211",
"serverIP": "218.49.174.47"
}
|
Create a JSON artifact from the message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=206.214.130.211 dst=218.49.174.47 protocol=tcp sport=51188 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=206.214.130.211 dst=218.49.174.47 protocol=tcp sport=51188 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51188
protocol: 6
streamName: meraki_l7_firewall
clientIP: 206.214.130.211
serverIP: 218.49.174.47
|
Explain this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=62.108.113.3 dst=160.177.159.195 protocol=tcp sport=51188 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=62.108.113.3 dst=160.177.159.195 protocol=tcp sport=51188 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51188,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "62.108.113.3",
"serverIP": "160.177.159.195"
}
|
Create a JSON artifact from the message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=62.108.113.3 dst=160.177.159.195 protocol=tcp sport=51188 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=62.108.113.3 dst=160.177.159.195 protocol=tcp sport=51188 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51188
protocol: 6
streamName: meraki_l7_firewall
clientIP: 62.108.113.3
serverIP: 160.177.159.195
|
Explain this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=154.132.209.30 dst=208.117.34.31 protocol=tcp sport=51188 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=154.132.209.30 dst=208.117.34.31 protocol=tcp sport=51188 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51188,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "154.132.209.30",
"serverIP": "208.117.34.31"
}
|
Create a JSON artifact from the message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=154.132.209.30 dst=208.117.34.31 protocol=tcp sport=51188 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=64.139.91.93 1 1656690528.092329968 M64_MX67C_Augusta l7_firewall src=154.132.209.30 dst=208.117.34.31 protocol=tcp sport=51188 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51188
protocol: 6
streamName: meraki_l7_firewall
clientIP: 154.132.209.30
serverIP: 208.117.34.31
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-26T16:19:14.916Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-26T16:19:16.220Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tcharlie\n\tSource Network Address:\t51.143.41.167\n\tSource Port:\t\t49805\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"51.143.41.167","IpPort":"49805","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"charlie"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6375903123,"task":"Logon"}}
|
{
"action": "Logon",
"clientport": 49805,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-26T16:19:14.916Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-26T16:19:16.220Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tcharlie\\n\\tSource Network Address:\\t51.143.41.167\\n\\tSource Port:\\t\\t49805\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"51.143.41.167\",\"IpPort\":\"49805\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"charlie\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6375903123,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6375903123",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "51.143.41.167",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-26T16:19:14.916Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-26T16:19:16.220Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tcharlie\n\tSource Network Address:\t51.143.41.167\n\tSource Port:\t\t49805\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"51.143.41.167","IpPort":"49805","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"charlie"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6375903123,"task":"Logon"}}
|
Product: Windows Active Directory
Vendor: Microsoft
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-26T16:19:14.916Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-26T16:19:16.220Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tcharlie\n\tSource Network Address:\t51.143.41.167\n\tSource Port:\t\t49805\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"51.143.41.167","IpPort":"49805","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"charlie"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6375903123,"task":"Logon"}}
|
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 49805
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6375903123
streamName: microsoft-windows-security-auditing
clientIP: 51.143.41.167
userName: charlie
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-26T16:19:14.916Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-26T16:19:16.220Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tbob\n\tSource Network Address:\t227.187.156.77\n\tSource Port:\t\t49805\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"227.187.156.77","IpPort":"49805","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"bob"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6375903123,"task":"Logon"}}
|
{
"action": "Logon",
"clientport": 49805,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-09-26T16:19:14.916Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-09-26T16:19:16.220Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tbob\\n\\tSource Network Address:\\t227.187.156.77\\n\\tSource Port:\\t\\t49805\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"227.187.156.77\",\"IpPort\":\"49805\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"bob\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6375903123,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6375903123",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "227.187.156.77",
"userName": "bob"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-09-26T16:19:14.916Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-09-26T16:19:16.220Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tbob\n\tSource Network Address:\t227.187.156.77\n\tSource Port:\t\t49805\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"227.187.156.77","IpPort":"49805","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"bob"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6375903123,"task":"Logon"}}
|
Product: Windows Active Directory
Vendor: Microsoft
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.