input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|185.223.90.145|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 5 03:34:57 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699155297 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 185.223.90.145
Explain this syslog message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|188.18.216.239|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 5 03:34:57", "message": "<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|188.18.216.239|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699155297", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "188.18.216.239" }
Create a JSON artifact from the message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|188.18.216.239|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 5 03:34:57 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699155297|access denied|188.18.216.239|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 5 03:34:57 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699155297 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 188.18.216.239
Explain this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=177.14.99.220 dst=120.149.240.227 protocol=udp sport=123 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=177.14.99.220 dst=120.149.240.227 protocol=udp sport=123 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 123, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "177.14.99.220", "serverIP": "120.149.240.227" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=177.14.99.220 dst=120.149.240.227 protocol=udp sport=123 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=177.14.99.220 dst=120.149.240.227 protocol=udp sport=123 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 123 protocol: 17 streamName: meraki_l7_firewall clientIP: 177.14.99.220 serverIP: 120.149.240.227
Explain this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=20.191.43.232 dst=158.230.174.236 protocol=udp sport=123 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=20.191.43.232 dst=158.230.174.236 protocol=udp sport=123 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 123, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "20.191.43.232", "serverIP": "158.230.174.236" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=20.191.43.232 dst=158.230.174.236 protocol=udp sport=123 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=20.191.43.232 dst=158.230.174.236 protocol=udp sport=123 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 123 protocol: 17 streamName: meraki_l7_firewall clientIP: 20.191.43.232 serverIP: 158.230.174.236
Explain this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=131.46.186.229 dst=54.255.164.69 protocol=udp sport=123 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=131.46.186.229 dst=54.255.164.69 protocol=udp sport=123 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 123, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "131.46.186.229", "serverIP": "54.255.164.69" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=131.46.186.229 dst=54.255.164.69 protocol=udp sport=123 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=131.46.186.229 dst=54.255.164.69 protocol=udp sport=123 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 123 protocol: 17 streamName: meraki_l7_firewall clientIP: 131.46.186.229 serverIP: 54.255.164.69
Explain this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=6.154.23.219 dst=76.112.63.15 protocol=udp sport=123 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=6.154.23.219 dst=76.112.63.15 protocol=udp sport=123 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 123, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "6.154.23.219", "serverIP": "76.112.63.15" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=6.154.23.219 dst=76.112.63.15 protocol=udp sport=123 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1664371592.743062281 NORDC_MX400_1 l7_firewall src=6.154.23.219 dst=76.112.63.15 protocol=udp sport=123 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 123 protocol: 17 streamName: meraki_l7_firewall clientIP: 6.154.23.219 serverIP: 76.112.63.15
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=252.10.173.11 dst=72.24.5.39 protocol=udp sport=34784 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=252.10.173.11 dst=72.24.5.39 protocol=udp sport=34784 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 34784, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "252.10.173.11", "serverIP": "72.24.5.39" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=252.10.173.11 dst=72.24.5.39 protocol=udp sport=34784 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=252.10.173.11 dst=72.24.5.39 protocol=udp sport=34784 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 34784 protocol: 17 streamName: meraki_l7_firewall clientIP: 252.10.173.11 serverIP: 72.24.5.39
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=151.147.108.121 dst=128.252.136.164 protocol=udp sport=34784 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=151.147.108.121 dst=128.252.136.164 protocol=udp sport=34784 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 34784, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "151.147.108.121", "serverIP": "128.252.136.164" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=151.147.108.121 dst=128.252.136.164 protocol=udp sport=34784 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=151.147.108.121 dst=128.252.136.164 protocol=udp sport=34784 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 34784 protocol: 17 streamName: meraki_l7_firewall clientIP: 151.147.108.121 serverIP: 128.252.136.164
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=213.192.182.98 dst=70.156.132.88 protocol=udp sport=34784 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=213.192.182.98 dst=70.156.132.88 protocol=udp sport=34784 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 34784, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "213.192.182.98", "serverIP": "70.156.132.88" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=213.192.182.98 dst=70.156.132.88 protocol=udp sport=34784 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=213.192.182.98 dst=70.156.132.88 protocol=udp sport=34784 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 34784 protocol: 17 streamName: meraki_l7_firewall clientIP: 213.192.182.98 serverIP: 70.156.132.88
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=249.167.221.56 dst=175.149.223.102 protocol=udp sport=34784 dport=123 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 123, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=249.167.221.56 dst=175.149.223.102 protocol=udp sport=34784 dport=123 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 34784, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "249.167.221.56", "serverIP": "175.149.223.102" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=249.167.221.56 dst=175.149.223.102 protocol=udp sport=34784 dport=123 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658860038.858002666 NORDC_MX400_1 l7_firewall src=249.167.221.56 dst=175.149.223.102 protocol=udp sport=34784 dport=123 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 123 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 34784 protocol: 17 streamName: meraki_l7_firewall clientIP: 249.167.221.56 serverIP: 175.149.223.102
Explain this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=31.165.201.228 dst=100.138.151.28 protocol=tcp sport=57898 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=31.165.201.228 dst=100.138.151.28 protocol=tcp sport=57898 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57898, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "31.165.201.228", "serverIP": "100.138.151.28" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=31.165.201.228 dst=100.138.151.28 protocol=tcp sport=57898 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=31.165.201.228 dst=100.138.151.28 protocol=tcp sport=57898 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57898 protocol: 6 streamName: meraki_l7_firewall clientIP: 31.165.201.228 serverIP: 100.138.151.28
Explain this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=131.176.165.58 dst=29.232.208.222 protocol=tcp sport=57898 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=131.176.165.58 dst=29.232.208.222 protocol=tcp sport=57898 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57898, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "131.176.165.58", "serverIP": "29.232.208.222" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=131.176.165.58 dst=29.232.208.222 protocol=tcp sport=57898 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=131.176.165.58 dst=29.232.208.222 protocol=tcp sport=57898 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57898 protocol: 6 streamName: meraki_l7_firewall clientIP: 131.176.165.58 serverIP: 29.232.208.222
Explain this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=167.245.166.25 dst=58.182.195.176 protocol=tcp sport=57898 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=167.245.166.25 dst=58.182.195.176 protocol=tcp sport=57898 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57898, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "167.245.166.25", "serverIP": "58.182.195.176" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=167.245.166.25 dst=58.182.195.176 protocol=tcp sport=57898 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=167.245.166.25 dst=58.182.195.176 protocol=tcp sport=57898 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57898 protocol: 6 streamName: meraki_l7_firewall clientIP: 167.245.166.25 serverIP: 58.182.195.176
Explain this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=115.64.213.42 dst=106.23.106.181 protocol=tcp sport=57898 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=115.64.213.42 dst=106.23.106.181 protocol=tcp sport=57898 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 57898, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "115.64.213.42", "serverIP": "106.23.106.181" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=115.64.213.42 dst=106.23.106.181 protocol=tcp sport=57898 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1655127179.540589810 M53_MX67C_GulfShores l7_firewall src=115.64.213.42 dst=106.23.106.181 protocol=tcp sport=57898 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 57898 protocol: 6 streamName: meraki_l7_firewall clientIP: 115.64.213.42 serverIP: 106.23.106.181
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:16:41.040Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:16:42.247Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"ACME (acme.acmecloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{045ccd7e-4fd8-4bf2-942e-d5b11946ce73}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"fish","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":812}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2721084,"task":"Special Logon"}}
{ "senderhost": "10.0.0.102", "severitylabel": "Info", "tags": [ "v8", "eventId:4672", "microsoft-windows-security-auditing", "security_privilege_change" ], "productids": [ 43 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-03T05:16:41.040Z\",\"agent\":{\"ephemeral_id\":\"54f9c4d3-b89b-418e-9563-3a37a2649e9b\",\"id\":\"c1a9836f-a0ae-477f-9125-47ef8fc5a674\",\"name\":\"AWeb02\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-03T05:16:42.247Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"AWeb02\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tNT AUTHORITY\\n\\tLogon ID:\\t\\t0x3E7\\n\\nPrivileges:\\t\\tSeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"ACME (acme.acmecloud.com)\",\"senderHost\":\"10.0.0.102\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{045ccd7e-4fd8-4bf2-942e-d5b11946ce73}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"AWeb02\",\"event_data\":{\"PrivilegeList\":\"SeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"NT AUTHORITY\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"fish\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":812}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":2721084,\"task\":\"Special Logon\"}}", "sensitivity": "normal", "messagetype": "security_privilege_change", "vendorcode": "2721084", "action": "Special Logon", "streamName": "microsoft-windows-security-auditing", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:16:41.040Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:16:42.247Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"ACME (acme.acmecloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{045ccd7e-4fd8-4bf2-942e-d5b11946ce73}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"fish","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":812}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2721084,"task":"Special Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:16:41.040Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:16:42.247Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"ACME (acme.acmecloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{045ccd7e-4fd8-4bf2-942e-d5b11946ce73}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"fish","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":812}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2721084,"task":"Special Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 10.0.0.102 severitylabel: Info tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change'] productids: [43] sourceinfo: unknown sensitivity: normal messagetype: security_privilege_change vendorcode: 2721084 action: Special Logon streamName: microsoft-windows-security-auditing userName: fish
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:16:41.863Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:16:42.247Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{4118781e-1d0c-4cab-bedc-dacc3eee8ce5}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"janedoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":812}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2721090,"task":"Special Logon"}}
{ "senderhost": "10.0.0.102", "severitylabel": "Info", "tags": [ "v8", "eventId:4672", "microsoft-windows-security-auditing", "security_privilege_change" ], "productids": [ 43 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-03T05:16:41.863Z\",\"agent\":{\"ephemeral_id\":\"54f9c4d3-b89b-418e-9563-3a37a2649e9b\",\"id\":\"c1a9836f-a0ae-477f-9125-47ef8fc5a674\",\"name\":\"AWeb02\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-03T05:16:42.247Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"AWeb02\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tNT AUTHORITY\\n\\tLogon ID:\\t\\t0x3E7\\n\\nPrivileges:\\t\\tSeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"OSCORP (oscorp.oscorpcloud.com)\",\"senderHost\":\"10.0.0.102\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{4118781e-1d0c-4cab-bedc-dacc3eee8ce5}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"AWeb02\",\"event_data\":{\"PrivilegeList\":\"SeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"NT AUTHORITY\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"janedoe\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":712,\"thread\":{\"id\":812}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":2721090,\"task\":\"Special Logon\"}}", "sensitivity": "normal", "messagetype": "security_privilege_change", "vendorcode": "2721090", "action": "Special Logon", "streamName": "microsoft-windows-security-auditing", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:16:41.863Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:16:42.247Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{4118781e-1d0c-4cab-bedc-dacc3eee8ce5}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"janedoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":812}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2721090,"task":"Special Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:16:41.863Z","agent":{"ephemeral_id":"54f9c4d3-b89b-418e-9563-3a37a2649e9b","id":"c1a9836f-a0ae-477f-9125-47ef8fc5a674","name":"AWeb02","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:16:42.247Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"AWeb02"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"OSCORP (oscorp.oscorpcloud.com)","senderHost":"10.0.0.102","sensitivity":"normal","winlog":{"activity_id":"{4118781e-1d0c-4cab-bedc-dacc3eee8ce5}","api":"wineventlog","channel":"Security","computer_name":"AWeb02","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"janedoe","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":712,"thread":{"id":812}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":2721090,"task":"Special Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 10.0.0.102 severitylabel: Info tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change'] productids: [43] sourceinfo: unknown sensitivity: normal messagetype: security_privilege_change vendorcode: 2721090 action: Special Logon streamName: microsoft-windows-security-auditing userName: janedoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:19:07.537Z","agent":{"ephemeral_id":"4853e543-6cb1-4d27-a0b5-92904a51b634","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:19:08.302Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"MicroixWeb01"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"activity_id":"{7a2308e1-a15f-4433-8f98-58d3263a7489}","api":"wineventlog","channel":"Security","computer_name":"MicroixWeb01","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":708,"thread":{"id":6076}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1199548,"task":"Special Logon"}}
{ "senderhost": "10.0.0.75", "severitylabel": "Info", "tags": [ "v8", "eventId:4672", "microsoft-windows-security-auditing", "security_privilege_change" ], "productids": [ 43 ], "sourceinfo": "unknown", "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2022-08-03T05:19:07.537Z\",\"agent\":{\"ephemeral_id\":\"4853e543-6cb1-4d27-a0b5-92904a51b634\",\"id\":\"76eb9f91-c210-4b95-9288-5a2c5f4e1a67\",\"name\":\"MicroixWeb01\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Special Logon\",\"code\":\"4672\",\"created\":\"2022-08-03T05:19:08.302Z\",\"kind\":\"event\",\"outcome\":\"success\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"MicroixWeb01\"},\"log\":{\"level\":\"information\"},\"message\":\"Special privileges assigned to new logon.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-5-18\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tNT AUTHORITY\\n\\tLogon ID:\\t\\t0x3E7\\n\\nPrivileges:\\t\\tSeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"organization\":\"UMBRELLA (umbrella.umbrellacloud.com)\",\"senderHost\":\"10.0.0.75\",\"sensitivity\":\"normal\",\"winlog\":{\"activity_id\":\"{7a2308e1-a15f-4433-8f98-58d3263a7489}\",\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"MicroixWeb01\",\"event_data\":{\"PrivilegeList\":\"SeAssignPrimaryTokenPrivilege\\n\\t\\t\\tSeTcbPrivilege\\n\\t\\t\\tSeSecurityPrivilege\\n\\t\\t\\tSeTakeOwnershipPrivilege\\n\\t\\t\\tSeLoadDriverPrivilege\\n\\t\\t\\tSeBackupPrivilege\\n\\t\\t\\tSeRestorePrivilege\\n\\t\\t\\tSeDebugPrivilege\\n\\t\\t\\tSeAuditPrivilege\\n\\t\\t\\tSeSystemEnvironmentPrivilege\\n\\t\\t\\tSeImpersonatePrivilege\\n\\t\\t\\tSeDelegateSessionUserImpersonatePrivilege\",\"SubjectDomainName\":\"NT AUTHORITY\",\"SubjectLogonId\":\"0x3e7\",\"SubjectUserName\":\"nighthawk\",\"SubjectUserSid\":\"S-1-5-18\"},\"event_id\":\"4672\",\"keywords\":[\"Audit Success\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":6076}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":1199548,\"task\":\"Special Logon\"}}", "sensitivity": "normal", "messagetype": "security_privilege_change", "vendorcode": "1199548", "action": "Special Logon", "streamName": "microsoft-windows-security-auditing", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:19:07.537Z","agent":{"ephemeral_id":"4853e543-6cb1-4d27-a0b5-92904a51b634","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:19:08.302Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"MicroixWeb01"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"activity_id":"{7a2308e1-a15f-4433-8f98-58d3263a7489}","api":"wineventlog","channel":"Security","computer_name":"MicroixWeb01","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":708,"thread":{"id":6076}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1199548,"task":"Special Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2022-08-03T05:19:07.537Z","agent":{"ephemeral_id":"4853e543-6cb1-4d27-a0b5-92904a51b634","id":"76eb9f91-c210-4b95-9288-5a2c5f4e1a67","name":"MicroixWeb01","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Special Logon","code":"4672","created":"2022-08-03T05:19:08.302Z","kind":"event","outcome":"success","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"MicroixWeb01"},"log":{"level":"information"},"message":"Special privileges assigned to new logon.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-18\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tNT AUTHORITY\n\tLogon ID:\t\t0x3E7\n\nPrivileges:\t\tSeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","organization":"UMBRELLA (umbrella.umbrellacloud.com)","senderHost":"10.0.0.75","sensitivity":"normal","winlog":{"activity_id":"{7a2308e1-a15f-4433-8f98-58d3263a7489}","api":"wineventlog","channel":"Security","computer_name":"MicroixWeb01","event_data":{"PrivilegeList":"SeAssignPrimaryTokenPrivilege\n\t\t\tSeTcbPrivilege\n\t\t\tSeSecurityPrivilege\n\t\t\tSeTakeOwnershipPrivilege\n\t\t\tSeLoadDriverPrivilege\n\t\t\tSeBackupPrivilege\n\t\t\tSeRestorePrivilege\n\t\t\tSeDebugPrivilege\n\t\t\tSeAuditPrivilege\n\t\t\tSeSystemEnvironmentPrivilege\n\t\t\tSeImpersonatePrivilege\n\t\t\tSeDelegateSessionUserImpersonatePrivilege","SubjectDomainName":"NT AUTHORITY","SubjectLogonId":"0x3e7","SubjectUserName":"nighthawk","SubjectUserSid":"S-1-5-18"},"event_id":"4672","keywords":["Audit Success"],"opcode":"Info","process":{"pid":708,"thread":{"id":6076}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":1199548,"task":"Special Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: senderhost: 10.0.0.75 severitylabel: Info tags: ['v8', 'eventId:4672', 'microsoft-windows-security-auditing', 'security_privilege_change'] productids: [43] sourceinfo: unknown sensitivity: normal messagetype: security_privilege_change vendorcode: 1199548 action: Special Logon streamName: microsoft-windows-security-auditing userName: nighthawk
Explain this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=130.44.215.132 dst=34.177.123.160 protocol=tcp sport=57664 dport=443 decision=blocked
{ "action": "block", "clientport": 57664, "message": "<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=130.44.215.132 dst=34.177.123.160 protocol=tcp sport=57664 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "130.44.215.132", "serverIP": "34.177.123.160" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=130.44.215.132 dst=34.177.123.160 protocol=tcp sport=57664 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=130.44.215.132 dst=34.177.123.160 protocol=tcp sport=57664 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57664 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 130.44.215.132 serverIP: 34.177.123.160
Explain this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=128.153.213.87 dst=207.248.83.40 protocol=tcp sport=57664 dport=443 decision=blocked
{ "action": "block", "clientport": 57664, "message": "<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=128.153.213.87 dst=207.248.83.40 protocol=tcp sport=57664 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "128.153.213.87", "serverIP": "207.248.83.40" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=128.153.213.87 dst=207.248.83.40 protocol=tcp sport=57664 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=128.153.213.87 dst=207.248.83.40 protocol=tcp sport=57664 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57664 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 128.153.213.87 serverIP: 207.248.83.40
Explain this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=144.24.237.140 dst=152.207.166.110 protocol=tcp sport=57664 dport=443 decision=blocked
{ "action": "block", "clientport": 57664, "message": "<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=144.24.237.140 dst=152.207.166.110 protocol=tcp sport=57664 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "144.24.237.140", "serverIP": "152.207.166.110" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=144.24.237.140 dst=152.207.166.110 protocol=tcp sport=57664 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=144.24.237.140 dst=152.207.166.110 protocol=tcp sport=57664 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57664 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 144.24.237.140 serverIP: 152.207.166.110
Explain this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=73.245.243.239 dst=221.235.254.112 protocol=tcp sport=57664 dport=443 decision=blocked
{ "action": "block", "clientport": 57664, "message": "<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=73.245.243.239 dst=221.235.254.112 protocol=tcp sport=57664 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "73.245.243.239", "serverIP": "221.235.254.112" }
Create a JSON artifact from the message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=73.245.243.239 dst=221.235.254.112 protocol=tcp sport=57664 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=173.160.85.1 1 1687570526.032630465 M93_MX67C_MECCumming l7_firewall src=73.245.243.239 dst=221.235.254.112 protocol=tcp sport=57664 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 57664 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 73.245.243.239 serverIP: 221.235.254.112
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=162.221.198.43 dst=112.64.205.164 protocol=tcp sport=60347 dport=443 decision=blocked
{ "action": "block", "clientport": 60347, "message": "<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=162.221.198.43 dst=112.64.205.164 protocol=tcp sport=60347 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "162.221.198.43", "serverIP": "112.64.205.164" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=162.221.198.43 dst=112.64.205.164 protocol=tcp sport=60347 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=162.221.198.43 dst=112.64.205.164 protocol=tcp sport=60347 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60347 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 162.221.198.43 serverIP: 112.64.205.164
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=188.105.243.158 dst=121.70.240.179 protocol=tcp sport=60347 dport=443 decision=blocked
{ "action": "block", "clientport": 60347, "message": "<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=188.105.243.158 dst=121.70.240.179 protocol=tcp sport=60347 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "188.105.243.158", "serverIP": "121.70.240.179" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=188.105.243.158 dst=121.70.240.179 protocol=tcp sport=60347 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=188.105.243.158 dst=121.70.240.179 protocol=tcp sport=60347 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60347 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 188.105.243.158 serverIP: 121.70.240.179
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=176.223.255.30 dst=222.166.94.80 protocol=tcp sport=60347 dport=443 decision=blocked
{ "action": "block", "clientport": 60347, "message": "<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=176.223.255.30 dst=222.166.94.80 protocol=tcp sport=60347 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "176.223.255.30", "serverIP": "222.166.94.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=176.223.255.30 dst=222.166.94.80 protocol=tcp sport=60347 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=176.223.255.30 dst=222.166.94.80 protocol=tcp sport=60347 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60347 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 176.223.255.30 serverIP: 222.166.94.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=120.137.107.225 dst=247.26.239.31 protocol=tcp sport=60347 dport=443 decision=blocked
{ "action": "block", "clientport": 60347, "message": "<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=120.137.107.225 dst=247.26.239.31 protocol=tcp sport=60347 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "120.137.107.225", "serverIP": "247.26.239.31" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=120.137.107.225 dst=247.26.239.31 protocol=tcp sport=60347 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690561383.464670159 NORDC_MX400_1 l7_firewall src=120.137.107.225 dst=247.26.239.31 protocol=tcp sport=60347 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 60347 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 120.137.107.225 serverIP: 247.26.239.31
Explain this syslog message
<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.77.43.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.31.195.155 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication="Linux Gnu (cow) " dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.31.195.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 58034, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1688851222737 ", "message": "<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.77.43.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=121.31.195.155 spt=58034 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication=\"Linux Gnu (cow) \" dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.31.195.155 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:45.128.232.62", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "121.31.195.155", "serverIP": "96.77.43.218", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.77.43.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.31.195.155 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication="Linux Gnu (cow) " dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.31.195.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=96.77.43.218 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=121.31.195.155 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication="Linux Gnu (cow) " dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=121.31.195.155 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 58034 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1688851222737 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:45.128.232.62', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 121.31.195.155 serverIP: 96.77.43.218 userName: -
Explain this syslog message
<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=182.98.183.193 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.186.173.16 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication="Linux Gnu (cow) " dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.186.173.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 58034, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1688851222737 ", "message": "<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=182.98.183.193 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=22.186.173.16 spt=58034 requestMethod=GET app=HTTP requestContext=\"-\" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication=\"Linux Gnu (cow) \" dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.186.173.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 80, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "ProxyIP:45.128.232.62", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "22.186.173.16", "serverIP": "182.98.183.193", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=182.98.183.193 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.186.173.16 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication="Linux Gnu (cow) " dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.186.173.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 8 16:20:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=182.98.183.193 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=22.186.173.16 spt=58034 requestMethod=GET app=HTTP requestContext="-" start=Jul 08 2023 16:20:22 rt=1688851222737 request=/ requestClientApplication="Linux Gnu (cow) " dvchost=WAFirewall externalId=189376090c3-d6cf7720 cn2=58034 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=22.186.173.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 58034 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1688851222737 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 80 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'ProxyIP:45.128.232.62', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] vendorcode: 342 streamName: barracuda_waf clientIP: 22.186.173.16 serverIP: 182.98.183.193 userName: -
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t110.21.11.179\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.21.11.179","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
{ "action": "Logon", "clientport": 28013, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-18T14:19:46.943Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-18T14:19:47.858Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t110.21.11.179\\n\\tSource Port:\\t\\t28013\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"110.21.11.179\",\"IpPort\":\"28013\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":3560}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6956800371,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6956800371", "streamName": "microsoft-windows-security-auditing", "clientIP": "110.21.11.179", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t110.21.11.179\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.21.11.179","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t110.21.11.179\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"110.21.11.179","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 28013 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6956800371 streamName: microsoft-windows-security-auditing clientIP: 110.21.11.179 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t117.169.230.21\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"117.169.230.21","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
{ "action": "Logon", "clientport": 28013, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-18T14:19:46.943Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-18T14:19:47.858Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t117.169.230.21\\n\\tSource Port:\\t\\t28013\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"117.169.230.21\",\"IpPort\":\"28013\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":3560}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6956800371,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6956800371", "streamName": "microsoft-windows-security-auditing", "clientIP": "117.169.230.21", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t117.169.230.21\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"117.169.230.21","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t117.169.230.21\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"117.169.230.21","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 28013 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6956800371 streamName: microsoft-windows-security-auditing clientIP: 117.169.230.21 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t190.19.22.186\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"190.19.22.186","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
{ "action": "Logon", "clientport": 28013, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-18T14:19:46.943Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-18T14:19:47.858Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t190.19.22.186\\n\\tSource Port:\\t\\t28013\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"190.19.22.186\",\"IpPort\":\"28013\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":3560}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6956800371,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6956800371", "streamName": "microsoft-windows-security-auditing", "clientIP": "190.19.22.186", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t190.19.22.186\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"190.19.22.186","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t190.19.22.186\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"190.19.22.186","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 28013 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6956800371 streamName: microsoft-windows-security-auditing clientIP: 190.19.22.186 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t205.98.174.46\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"205.98.174.46","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
{ "action": "Logon", "clientport": 28013, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2024-03-18T14:19:46.943Z\",\"agent\":{\"ephemeral_id\":\"538aaca9-e441-4020-89ba-57e1603568a7\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-03-18T14:19:47.858Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tB49WVG3\\n\\tSource Network Address:\\t205.98.174.46\\n\\tSource Port:\\t\\t28013\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"205.98.174.46\",\"IpPort\":\"28013\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"B49WVG3\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":720,\"thread\":{\"id\":3560}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6956800371,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6956800371", "streamName": "microsoft-windows-security-auditing", "clientIP": "205.98.174.46", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t205.98.174.46\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"205.98.174.46","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2024-03-18T14:19:46.943Z","agent":{"ephemeral_id":"538aaca9-e441-4020-89ba-57e1603568a7","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-03-18T14:19:47.858Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tB49WVG3\n\tSource Network Address:\t205.98.174.46\n\tSource Port:\t\t28013\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"205.98.174.46","IpPort":"28013","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"B49WVG3"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":720,"thread":{"id":3560}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6956800371,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 28013 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6956800371 streamName: microsoft-windows-security-auditing clientIP: 205.98.174.46 userName: charlie
Explain this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=95.146.241.175 dpt=443 act=DENY msg=["-"] duser="-" src=219.182.29.34 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=219.182.29.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38286, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698402143431 ", "message": "<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=95.146.241.175 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=219.182.29.34 spt=38286 requestMethod=\"-\" app=TLSv1.2 requestContext=\"-\" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=219.182.29.34 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:104.248.130.34", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "219.182.29.34", "serverIP": "95.146.241.175", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=95.146.241.175 dpt=443 act=DENY msg=["-"] duser="-" src=219.182.29.34 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=219.182.29.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=95.146.241.175 dpt=443 act=DENY msg=["-"] duser="-" src=219.182.29.34 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=219.182.29.34 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38286 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698402143431 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:104.248.130.34', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 219.182.29.34 serverIP: 95.146.241.175 userName: -
Explain this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=133.1.161.64 dpt=443 act=DENY msg=["-"] duser="-" src=241.2.21.214 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=241.2.21.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38286, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698402143431 ", "message": "<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=133.1.161.64 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=241.2.21.214 spt=38286 requestMethod=\"-\" app=TLSv1.2 requestContext=\"-\" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=241.2.21.214 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:104.248.130.34", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "241.2.21.214", "serverIP": "133.1.161.64", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=133.1.161.64 dpt=443 act=DENY msg=["-"] duser="-" src=241.2.21.214 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=241.2.21.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=133.1.161.64 dpt=443 act=DENY msg=["-"] duser="-" src=241.2.21.214 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=241.2.21.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38286 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698402143431 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:104.248.130.34', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 241.2.21.214 serverIP: 133.1.161.64 userName: -
Explain this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=19.219.30.150 dpt=443 act=DENY msg=["-"] duser="-" src=176.233.184.16 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=176.233.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 38286, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1698402143431 ", "message": "<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=19.219.30.150 dpt=443 act=DENY msg=[\"-\"] duser=\"-\" src=176.233.184.16 spt=38286 requestMethod=\"-\" app=TLSv1.2 requestContext=\"-\" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=176.233.184.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "INVALID_METHOD", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "cef", "SessionID:-", "FollowUpAction:NONE", "barracuda_waf_INVALID_METHOD", "ProxyIP:104.248.130.34", "AttackGroup:Protocol Violations", "INVALID_METHOD" ], "vendorcode": "118", "streamName": "barracuda_waf", "clientIP": "176.233.184.16", "serverIP": "19.219.30.150", "userName": "-" }
Create a JSON artifact from the message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=19.219.30.150 dpt=443 act=DENY msg=["-"] duser="-" src=176.233.184.16 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=176.233.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Oct 27 05:22:23 WAFirewall CEF:0|Barracuda|WAF|1210|118|INVALID_METHOD|1|cat=WF dst=19.219.30.150 dpt=443 act=DENY msg=["-"] duser="-" src=176.233.184.16 spt=38286 requestMethod="-" app=TLSv1.2 requestContext="-" start=Oct 27 2023 05:22:23 rt=1698402143431 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18b70a80cc7-43b74674 cn2=38286 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Protocol Violations cs4Label=AttackGroup cs5=176.233.184.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 38286 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1698402143431 messagetype: INVALID_METHOD priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'barracuda_waf_INVALID_METHOD', 'ProxyIP:104.248.130.34', 'AttackGroup:Protocol Violations', 'INVALID_METHOD'] vendorcode: 118 streamName: barracuda_waf clientIP: 176.233.184.16 serverIP: 19.219.30.150 userName: -
Explain this syslog message