input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=24.216.132.210 1 1688068405.615465539 M28_MX67C_Lawrencville l7_firewall src=147.29.138.22 dst=15.3.202.139 protocol=tcp sport=57966 dport=443 decision=blocked | {
"action": "block",
"clientport": 57966,
"message": "<134>Original Address=24.216.132.210 1 1688068405.615465539 M28_MX67C_Lawrencville l7_firewall src=147.29.138.22 dst=15.3.202.139 protocol=tcp sport=57966 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "147.29.138.22",
"serverIP": "15.3.202.139"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1688068405.615465539 M28_MX67C_Lawrencville l7_firewall src=147.29.138.22 dst=15.3.202.139 protocol=tcp sport=57966 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1688068405.615465539 M28_MX67C_Lawrencville l7_firewall src=147.29.138.22 dst=15.3.202.139 protocol=tcp sport=57966 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57966
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 147.29.138.22
serverIP: 15.3.202.139 | Explain this syslog message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.76.89.211 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.246.96.140 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.246.96.140 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55194,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709922669140 ",
"message": "<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.76.89.211 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=21.246.96.140 spt=55194 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.246.96.140 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:146.19.24.28",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "21.246.96.140",
"serverIP": "31.76.89.211",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.76.89.211 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.246.96.140 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.246.96.140 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=31.76.89.211 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=21.246.96.140 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=21.246.96.140 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55194
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709922669140
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 21.246.96.140
serverIP: 31.76.89.211
userName: - | Explain this syslog message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.18.118.10 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=51.31.197.130 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.31.197.130 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55194,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709922669140 ",
"message": "<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.18.118.10 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=51.31.197.130 spt=55194 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.31.197.130 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:146.19.24.28",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "51.31.197.130",
"serverIP": "87.18.118.10",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.18.118.10 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=51.31.197.130 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.31.197.130 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=87.18.118.10 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=51.31.197.130 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=51.31.197.130 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55194
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709922669140
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 51.31.197.130
serverIP: 87.18.118.10
userName: - | Explain this syslog message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.226.52.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.200.170.215 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.200.170.215 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 55194,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1709922669140 ",
"message": "<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.226.52.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=248.200.170.215 spt=55194 requestMethod=GET app=HTTP requestContext=\"-\" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.200.170.215 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"ProxyIP:146.19.24.28",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "248.200.170.215",
"serverIP": "29.226.52.151",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.226.52.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.200.170.215 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.200.170.215 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Mar 8 12:31:09 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=29.226.52.151 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=248.200.170.215 spt=55194 requestMethod=GET app=HTTP requestContext="-" start=Mar 08 2024 12:31:09 rt=1709922669140 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18e1f555254-b6d2d35e cn2=55194 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=248.200.170.215 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 55194
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1709922669140
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:146.19.24.28', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 248.200.170.215
serverIP: 29.226.52.151
userName: - | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=162.144.51.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:22:37Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"reg query HKLM /f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527\",\"parent_md5\":\"911d039e71583a07320b32bde22f8e22\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=162.144.51.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:22:37Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "162.144.51.243",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=162.144.51.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=162.144.51.243 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:22:37Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 162.144.51.243
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"bob","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=173.27.163.93 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:22:37Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"reg query HKLM /f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527\",\"parent_md5\":\"911d039e71583a07320b32bde22f8e22\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=173.27.163.93 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:22:37Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "173.27.163.93",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"bob","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=173.27.163.93 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"bob","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=173.27.163.93 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:22:37Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 173.27.163.93
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=196.127.215.14 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=196.127.215.14 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "196.127.215.14",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=196.127.215.14 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asstarkiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=196.127.215.14 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 196.127.215.14
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.164.202.119 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=13.164.202.119 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "13.164.202.119",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.164.202.119 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=13.164.202.119 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 13.164.202.119
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=139.61.213.83 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=139.61.213.83 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "139.61.213.83",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=139.61.213.83 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asacmeiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=139.61.213.83 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 139.61.213.83
userName: alice | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=52.76.16.122 dst=217.13.40.101 protocol=tcp sport=80 dport=37425 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=52.76.16.122 dst=217.13.40.101 protocol=tcp sport=80 dport=37425 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37425,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "217.13.40.101",
"serverIP": "52.76.16.122"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=52.76.16.122 dst=217.13.40.101 protocol=tcp sport=80 dport=37425 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=52.76.16.122 dst=217.13.40.101 protocol=tcp sport=80 dport=37425 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37425
protocol: 6
streamName: meraki_l7_firewall
clientIP: 217.13.40.101
serverIP: 52.76.16.122 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=28.117.204.220 dst=54.134.217.12 protocol=tcp sport=80 dport=37425 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=28.117.204.220 dst=54.134.217.12 protocol=tcp sport=80 dport=37425 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37425,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "54.134.217.12",
"serverIP": "28.117.204.220"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=28.117.204.220 dst=54.134.217.12 protocol=tcp sport=80 dport=37425 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=28.117.204.220 dst=54.134.217.12 protocol=tcp sport=80 dport=37425 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37425
protocol: 6
streamName: meraki_l7_firewall
clientIP: 54.134.217.12
serverIP: 28.117.204.220 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=134.74.182.56 dst=65.21.0.204 protocol=tcp sport=80 dport=37425 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=134.74.182.56 dst=65.21.0.204 protocol=tcp sport=80 dport=37425 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37425,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "65.21.0.204",
"serverIP": "134.74.182.56"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=134.74.182.56 dst=65.21.0.204 protocol=tcp sport=80 dport=37425 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=134.74.182.56 dst=65.21.0.204 protocol=tcp sport=80 dport=37425 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37425
protocol: 6
streamName: meraki_l7_firewall
clientIP: 65.21.0.204
serverIP: 134.74.182.56 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=68.65.0.68 dst=119.35.68.132 protocol=tcp sport=80 dport=37425 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=68.65.0.68 dst=119.35.68.132 protocol=tcp sport=80 dport=37425 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 37425,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "119.35.68.132",
"serverIP": "68.65.0.68"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=68.65.0.68 dst=119.35.68.132 protocol=tcp sport=80 dport=37425 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657722325.814485267 NORDC_MX400_1 l7_firewall src=68.65.0.68 dst=119.35.68.132 protocol=tcp sport=80 dport=37425 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 37425
protocol: 6
streamName: meraki_l7_firewall
clientIP: 119.35.68.132
serverIP: 68.65.0.68 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=253.10.31.107 dst=95.228.134.55 protocol=tcp sport=59081 dport=443 decision=blocked | {
"action": "block",
"clientport": 59081,
"message": "<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=253.10.31.107 dst=95.228.134.55 protocol=tcp sport=59081 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "253.10.31.107",
"serverIP": "95.228.134.55"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=253.10.31.107 dst=95.228.134.55 protocol=tcp sport=59081 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=253.10.31.107 dst=95.228.134.55 protocol=tcp sport=59081 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59081
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 253.10.31.107
serverIP: 95.228.134.55 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=191.224.68.3 dst=50.122.236.42 protocol=tcp sport=59081 dport=443 decision=blocked | {
"action": "block",
"clientport": 59081,
"message": "<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=191.224.68.3 dst=50.122.236.42 protocol=tcp sport=59081 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "191.224.68.3",
"serverIP": "50.122.236.42"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=191.224.68.3 dst=50.122.236.42 protocol=tcp sport=59081 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=191.224.68.3 dst=50.122.236.42 protocol=tcp sport=59081 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59081
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 191.224.68.3
serverIP: 50.122.236.42 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=163.202.11.211 dst=100.102.187.56 protocol=tcp sport=59081 dport=443 decision=blocked | {
"action": "block",
"clientport": 59081,
"message": "<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=163.202.11.211 dst=100.102.187.56 protocol=tcp sport=59081 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "163.202.11.211",
"serverIP": "100.102.187.56"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=163.202.11.211 dst=100.102.187.56 protocol=tcp sport=59081 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=163.202.11.211 dst=100.102.187.56 protocol=tcp sport=59081 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59081
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 163.202.11.211
serverIP: 100.102.187.56 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=68.4.91.54 dst=33.132.211.53 protocol=tcp sport=59081 dport=443 decision=blocked | {
"action": "block",
"clientport": 59081,
"message": "<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=68.4.91.54 dst=33.132.211.53 protocol=tcp sport=59081 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "68.4.91.54",
"serverIP": "33.132.211.53"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=68.4.91.54 dst=33.132.211.53 protocol=tcp sport=59081 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1685997747.655991468 M93_MX67C_MECCumming l7_firewall src=68.4.91.54 dst=33.132.211.53 protocol=tcp sport=59081 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59081
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 68.4.91.54
serverIP: 33.132.211.53 | Explain this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=228.73.226.193 dst=79.133.64.206 protocol=tcp sport=62982 dport=443 decision=blocked | {
"action": "block",
"clientport": 62982,
"message": "<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=228.73.226.193 dst=79.133.64.206 protocol=tcp sport=62982 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "228.73.226.193",
"serverIP": "79.133.64.206"
} | Create a JSON artifact from the message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=228.73.226.193 dst=79.133.64.206 protocol=tcp sport=62982 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=228.73.226.193 dst=79.133.64.206 protocol=tcp sport=62982 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62982
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 228.73.226.193
serverIP: 79.133.64.206 | Explain this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=164.179.59.63 dst=218.232.45.6 protocol=tcp sport=62982 dport=443 decision=blocked | {
"action": "block",
"clientport": 62982,
"message": "<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=164.179.59.63 dst=218.232.45.6 protocol=tcp sport=62982 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "164.179.59.63",
"serverIP": "218.232.45.6"
} | Create a JSON artifact from the message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=164.179.59.63 dst=218.232.45.6 protocol=tcp sport=62982 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=164.179.59.63 dst=218.232.45.6 protocol=tcp sport=62982 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62982
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 164.179.59.63
serverIP: 218.232.45.6 | Explain this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=170.250.23.124 dst=211.233.169.87 protocol=tcp sport=62982 dport=443 decision=blocked | {
"action": "block",
"clientport": 62982,
"message": "<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=170.250.23.124 dst=211.233.169.87 protocol=tcp sport=62982 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "170.250.23.124",
"serverIP": "211.233.169.87"
} | Create a JSON artifact from the message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=170.250.23.124 dst=211.233.169.87 protocol=tcp sport=62982 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=170.250.23.124 dst=211.233.169.87 protocol=tcp sport=62982 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62982
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 170.250.23.124
serverIP: 211.233.169.87 | Explain this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=189.177.198.195 dst=217.119.0.53 protocol=tcp sport=62982 dport=443 decision=blocked | {
"action": "block",
"clientport": 62982,
"message": "<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=189.177.198.195 dst=217.119.0.53 protocol=tcp sport=62982 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "189.177.198.195",
"serverIP": "217.119.0.53"
} | Create a JSON artifact from the message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=189.177.198.195 dst=217.119.0.53 protocol=tcp sport=62982 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=143.59.212.142 1 1688759961.735640229 M46_MX67C_Columbus l7_firewall src=189.177.198.195 dst=217.119.0.53 protocol=tcp sport=62982 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62982
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 189.177.198.195
serverIP: 217.119.0.53 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=193.195.182.169 dst=69.243.18.60 protocol=tcp sport=53435 dport=443 decision=blocked | {
"action": "block",
"clientport": 53435,
"message": "<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=193.195.182.169 dst=69.243.18.60 protocol=tcp sport=53435 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "193.195.182.169",
"serverIP": "69.243.18.60"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=193.195.182.169 dst=69.243.18.60 protocol=tcp sport=53435 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=193.195.182.169 dst=69.243.18.60 protocol=tcp sport=53435 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53435
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 193.195.182.169
serverIP: 69.243.18.60 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=223.39.90.124 dst=255.68.226.200 protocol=tcp sport=53435 dport=443 decision=blocked | {
"action": "block",
"clientport": 53435,
"message": "<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=223.39.90.124 dst=255.68.226.200 protocol=tcp sport=53435 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "223.39.90.124",
"serverIP": "255.68.226.200"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=223.39.90.124 dst=255.68.226.200 protocol=tcp sport=53435 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=223.39.90.124 dst=255.68.226.200 protocol=tcp sport=53435 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53435
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 223.39.90.124
serverIP: 255.68.226.200 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=247.124.65.99 dst=245.202.248.0 protocol=tcp sport=53435 dport=443 decision=blocked | {
"action": "block",
"clientport": 53435,
"message": "<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=247.124.65.99 dst=245.202.248.0 protocol=tcp sport=53435 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "247.124.65.99",
"serverIP": "245.202.248.0"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=247.124.65.99 dst=245.202.248.0 protocol=tcp sport=53435 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=247.124.65.99 dst=245.202.248.0 protocol=tcp sport=53435 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53435
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 247.124.65.99
serverIP: 245.202.248.0 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=220.62.45.108 dst=41.172.211.67 protocol=tcp sport=53435 dport=443 decision=blocked | {
"action": "block",
"clientport": 53435,
"message": "<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=220.62.45.108 dst=41.172.211.67 protocol=tcp sport=53435 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "220.62.45.108",
"serverIP": "41.172.211.67"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=220.62.45.108 dst=41.172.211.67 protocol=tcp sport=53435 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1688756910.971226835 M64_MX67C_Augusta l7_firewall src=220.62.45.108 dst=41.172.211.67 protocol=tcp sport=53435 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53435
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 220.62.45.108
serverIP: 41.172.211.67 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=174.196.190.195 dst=120.147.204.89 protocol=tcp sport=80 dport=23043 decision=blocked | {
"action": "block",
"clientport": 23043,
"message": "<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=174.196.190.195 dst=120.147.204.89 protocol=tcp sport=80 dport=23043 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "120.147.204.89",
"serverIP": "174.196.190.195"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=174.196.190.195 dst=120.147.204.89 protocol=tcp sport=80 dport=23043 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=174.196.190.195 dst=120.147.204.89 protocol=tcp sport=80 dport=23043 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23043
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 120.147.204.89
serverIP: 174.196.190.195 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=40.17.235.115 dst=46.4.135.3 protocol=tcp sport=80 dport=23043 decision=blocked | {
"action": "block",
"clientport": 23043,
"message": "<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=40.17.235.115 dst=46.4.135.3 protocol=tcp sport=80 dport=23043 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "46.4.135.3",
"serverIP": "40.17.235.115"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=40.17.235.115 dst=46.4.135.3 protocol=tcp sport=80 dport=23043 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=40.17.235.115 dst=46.4.135.3 protocol=tcp sport=80 dport=23043 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23043
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 46.4.135.3
serverIP: 40.17.235.115 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=245.97.144.128 dst=178.145.210.144 protocol=tcp sport=80 dport=23043 decision=blocked | {
"action": "block",
"clientport": 23043,
"message": "<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=245.97.144.128 dst=178.145.210.144 protocol=tcp sport=80 dport=23043 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "178.145.210.144",
"serverIP": "245.97.144.128"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=245.97.144.128 dst=178.145.210.144 protocol=tcp sport=80 dport=23043 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=245.97.144.128 dst=178.145.210.144 protocol=tcp sport=80 dport=23043 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23043
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 178.145.210.144
serverIP: 245.97.144.128 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=249.210.106.215 dst=32.154.237.58 protocol=tcp sport=80 dport=23043 decision=blocked | {
"action": "block",
"clientport": 23043,
"message": "<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=249.210.106.215 dst=32.154.237.58 protocol=tcp sport=80 dport=23043 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "32.154.237.58",
"serverIP": "249.210.106.215"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=249.210.106.215 dst=32.154.237.58 protocol=tcp sport=80 dport=23043 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685831538.849150548 NORDC_MX400_1 l7_firewall src=249.210.106.215 dst=32.154.237.58 protocol=tcp sport=80 dport=23043 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23043
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 32.154.237.58
serverIP: 249.210.106.215 | Explain this syslog message |
<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=149.93.204.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.142.49.109 spt=46094 requestMethod=GET app=HTTP requestContext="-" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.142.49.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:117.215.226.78"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=149.93.204.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=151.142.49.109 spt=46094 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7\" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.142.49.109 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661737611922 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 46094,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "151.142.49.109",
"serverIP": "149.93.204.105",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=149.93.204.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.142.49.109 spt=46094 requestMethod=GET app=HTTP requestContext="-" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.142.49.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=149.93.204.105 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=151.142.49.109 spt=46094 requestMethod=GET app=HTTP requestContext="-" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=151.142.49.109 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:117.215.226.78']
productids: [0]
sourceinfo: unknown
localstarttime: 1661737611922
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 46094
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 151.142.49.109
serverIP: 149.93.204.105
userName: - | Explain this syslog message |
<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=47.238.147.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.164.79.15 spt=46094 requestMethod=GET app=HTTP requestContext="-" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.164.79.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 80,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:117.215.226.78"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=47.238.147.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=189.164.79.15 spt=46094 requestMethod=GET app=HTTP requestContext=\"-\" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7\" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.164.79.15 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1661737611922 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/",
"clientport": 46094,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "189.164.79.15",
"serverIP": "47.238.147.225",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=47.238.147.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.164.79.15 spt=46094 requestMethod=GET app=HTTP requestContext="-" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.164.79.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Aug 28 20:46:52 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=47.238.147.225 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=189.164.79.15 spt=46094 requestMethod=GET app=HTTP requestContext="-" start=Aug 28 2022 20:46:51 rt=1661737611922 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7" dvchost=WAFirewall externalId=182e747aff6-cddf0a90 cn2=46094 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=189.164.79.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:117.215.226.78']
productids: [0]
sourceinfo: unknown
localstarttime: 1661737611922
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 46094
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 189.164.79.15
serverIP: 47.238.147.225
userName: - | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=21.155.54.186 dst=235.12.6.166 protocol=tcp sport=64218 dport=443 decision=blocked | {
"action": "block",
"clientport": 64218,
"message": "<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=21.155.54.186 dst=235.12.6.166 protocol=tcp sport=64218 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "21.155.54.186",
"serverIP": "235.12.6.166"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=21.155.54.186 dst=235.12.6.166 protocol=tcp sport=64218 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=21.155.54.186 dst=235.12.6.166 protocol=tcp sport=64218 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64218
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 21.155.54.186
serverIP: 235.12.6.166 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=112.118.67.80 dst=239.189.136.1 protocol=tcp sport=64218 dport=443 decision=blocked | {
"action": "block",
"clientport": 64218,
"message": "<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=112.118.67.80 dst=239.189.136.1 protocol=tcp sport=64218 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "112.118.67.80",
"serverIP": "239.189.136.1"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=112.118.67.80 dst=239.189.136.1 protocol=tcp sport=64218 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=112.118.67.80 dst=239.189.136.1 protocol=tcp sport=64218 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64218
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 112.118.67.80
serverIP: 239.189.136.1 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=201.241.144.142 dst=98.11.220.105 protocol=tcp sport=64218 dport=443 decision=blocked | {
"action": "block",
"clientport": 64218,
"message": "<134>Original Address=65.119.176.26 1 1691091279.109858754 M52_MX67C_Loxley l7_firewall src=201.241.144.142 dst=98.11.220.105 protocol=tcp sport=64218 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "201.241.144.142",
"serverIP": "98.11.220.105"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.