input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"185.109.53.177","externalIp":"181.85.86.71","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:10:08.000Z"} ::: clientIP=185.109.53.177 ::: serverIP=181.85.86.71 ::: userName=nighthawk ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:10:08.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"185.109.53.177\",\"externalIp\":\"181.85.86.71\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:10:08.000Z\"} ::: clientIP=185.109.53.177 ::: serverIP=181.85.86.71 ::: userName=nighthawk ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "185.109.53.177",
"serverIP": "181.85.86.71",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"185.109.53.177","externalIp":"181.85.86.71","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:10:08.000Z"} ::: clientIP=185.109.53.177 ::: serverIP=181.85.86.71 ::: userName=nighthawk ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"185.109.53.177","externalIp":"181.85.86.71","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:10:08.000Z"} ::: clientIP=185.109.53.177 ::: serverIP=181.85.86.71 ::: userName=nighthawk ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T19:10:08.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 185.109.53.177
serverIP: 181.85.86.71
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"209.141.16.211","externalIp":"157.52.46.189","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:10:08.000Z"} ::: clientIP=209.141.16.211 ::: serverIP=157.52.46.189 ::: userName=janedoe ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:10:08.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"209.141.16.211\",\"externalIp\":\"157.52.46.189\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:10:08.000Z\"} ::: clientIP=209.141.16.211 ::: serverIP=157.52.46.189 ::: userName=janedoe ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "209.141.16.211",
"serverIP": "157.52.46.189",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"209.141.16.211","externalIp":"157.52.46.189","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:10:08.000Z"} ::: clientIP=209.141.16.211 ::: serverIP=157.52.46.189 ::: userName=janedoe ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"209.141.16.211","externalIp":"157.52.46.189","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:10:08.000Z"} ::: clientIP=209.141.16.211 ::: serverIP=157.52.46.189 ::: userName=janedoe ::: created_at=2022-06-28T19:10:08.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:10:08.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T19:10:08.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 209.141.16.211
serverIP: 157.52.46.189
userName: janedoe | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=211.248.94.103 dst=78.151.145.150 protocol=tcp sport=61887 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=211.248.94.103 dst=78.151.145.150 protocol=tcp sport=61887 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 61887,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "211.248.94.103",
"serverIP": "78.151.145.150"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=211.248.94.103 dst=78.151.145.150 protocol=tcp sport=61887 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=211.248.94.103 dst=78.151.145.150 protocol=tcp sport=61887 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 61887
protocol: 6
streamName: meraki_l7_firewall
clientIP: 211.248.94.103
serverIP: 78.151.145.150 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=168.42.48.236 dst=240.99.15.9 protocol=tcp sport=61887 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=168.42.48.236 dst=240.99.15.9 protocol=tcp sport=61887 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 61887,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "168.42.48.236",
"serverIP": "240.99.15.9"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=168.42.48.236 dst=240.99.15.9 protocol=tcp sport=61887 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=168.42.48.236 dst=240.99.15.9 protocol=tcp sport=61887 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 61887
protocol: 6
streamName: meraki_l7_firewall
clientIP: 168.42.48.236
serverIP: 240.99.15.9 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=35.102.12.34 dst=37.165.245.99 protocol=tcp sport=61887 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=35.102.12.34 dst=37.165.245.99 protocol=tcp sport=61887 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 61887,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "35.102.12.34",
"serverIP": "37.165.245.99"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=35.102.12.34 dst=37.165.245.99 protocol=tcp sport=61887 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=35.102.12.34 dst=37.165.245.99 protocol=tcp sport=61887 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 61887
protocol: 6
streamName: meraki_l7_firewall
clientIP: 35.102.12.34
serverIP: 37.165.245.99 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=150.22.10.85 dst=178.196.80.181 protocol=tcp sport=61887 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=150.22.10.85 dst=178.196.80.181 protocol=tcp sport=61887 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 61887,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "150.22.10.85",
"serverIP": "178.196.80.181"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=150.22.10.85 dst=178.196.80.181 protocol=tcp sport=61887 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1656685388.072693740 M28_MX67C_Lawrencville l7_firewall src=150.22.10.85 dst=178.196.80.181 protocol=tcp sport=61887 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 61887
protocol: 6
streamName: meraki_l7_firewall
clientIP: 150.22.10.85
serverIP: 178.196.80.181 | Explain this syslog message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=221.225.66.3 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=59.140.12.148 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=59.140.12.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 9897,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731973001 ",
"message": "<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=221.225.66.3 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.aptv.org/\"] duser=\"-\" src=59.140.12.148 spt=9897 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=59.140.12.148 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"ProxyIP:3.224.220.101",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "59.140.12.148",
"serverIP": "221.225.66.3",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=221.225.66.3 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=59.140.12.148 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=59.140.12.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=221.225.66.3 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=59.140.12.148 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=59.140.12.148 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 9897
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731973001
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:3.224.220.101', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 59.140.12.148
serverIP: 221.225.66.3
userName: - | Explain this syslog message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=168.251.250.23 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=34.17.174.53 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=34.17.174.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 9897,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731973001 ",
"message": "<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=168.251.250.23 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.aptv.org/\"] duser=\"-\" src=34.17.174.53 spt=9897 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=34.17.174.53 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"ProxyIP:3.224.220.101",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "34.17.174.53",
"serverIP": "168.251.250.23",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=168.251.250.23 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=34.17.174.53 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=34.17.174.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=168.251.250.23 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=34.17.174.53 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=34.17.174.53 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 9897
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731973001
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:3.224.220.101', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 34.17.174.53
serverIP: 168.251.250.23
userName: - | Explain this syslog message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=109.244.125.32 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=196.2.132.194 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=196.2.132.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 26247,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731932671 ",
"message": "<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=109.244.125.32 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/\"] duser=\"-\" src=196.2.132.194 spt=26247 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=196.2.132.194 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"ProxyIP:52.70.240.171",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "196.2.132.194",
"serverIP": "109.244.125.32",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=109.244.125.32 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=196.2.132.194 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=196.2.132.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=109.244.125.32 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=196.2.132.194 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=196.2.132.194 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 26247
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731932671
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'ProxyIP:52.70.240.171', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 196.2.132.194
serverIP: 109.244.125.32
userName: - | Explain this syslog message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=175.85.93.16 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=215.78.81.38 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=215.78.81.38 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 26247,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731932671 ",
"message": "<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=175.85.93.16 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/\"] duser=\"-\" src=215.78.81.38 spt=26247 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=215.78.81.38 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"ProxyIP:52.70.240.171",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "215.78.81.38",
"serverIP": "175.85.93.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=175.85.93.16 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=215.78.81.38 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=215.78.81.38 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=175.85.93.16 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=215.78.81.38 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=215.78.81.38 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 26247
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731932671
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'ProxyIP:52.70.240.171', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 215.78.81.38
serverIP: 175.85.93.16
userName: - | Explain this syslog message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=159.171.20.97 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=220.99.252.241 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=220.99.252.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 26247,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731932671 ",
"message": "<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=159.171.20.97 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://boldgoals.org/\"] duser=\"-\" src=220.99.252.241 spt=26247 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=220.99.252.241 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"ProxyIP:52.70.240.171",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "220.99.252.241",
"serverIP": "159.171.20.97",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=159.171.20.97 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=220.99.252.241 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=220.99.252.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:45:32 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=159.171.20.97 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://boldgoals.org/"] duser="-" src=220.99.252.241 spt=26247 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:32 rt=1708731932671 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c1fff-d2ce4d50 cn2=26247 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=220.99.252.241 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 26247
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731932671
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'ProxyIP:52.70.240.171', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 220.99.252.241
serverIP: 159.171.20.97
userName: - | Explain this syslog message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.241.249.232 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=57.100.75.223 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=57.100.75.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35387,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731942031 ",
"message": "<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.241.249.232 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.ccr-bhm.org/\"] duser=\"-\" src=57.100.75.223 spt=35387 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=57.100.75.223 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:23.22.35.162",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "57.100.75.223",
"serverIP": "182.241.249.232",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.241.249.232 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=57.100.75.223 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=57.100.75.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=182.241.249.232 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=57.100.75.223 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=57.100.75.223 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35387
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731942031
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:23.22.35.162', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 57.100.75.223
serverIP: 182.241.249.232
userName: - | Explain this syslog message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=63.183.172.40 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=26.255.237.46 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=26.255.237.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35387,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731942031 ",
"message": "<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=63.183.172.40 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.ccr-bhm.org/\"] duser=\"-\" src=26.255.237.46 spt=35387 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=26.255.237.46 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:23.22.35.162",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "26.255.237.46",
"serverIP": "63.183.172.40",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=63.183.172.40 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=26.255.237.46 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=26.255.237.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=63.183.172.40 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=26.255.237.46 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=26.255.237.46 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35387
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731942031
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:23.22.35.162', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 26.255.237.46
serverIP: 63.183.172.40
userName: - | Explain this syslog message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=11.61.93.168 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=111.122.207.243 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=111.122.207.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 35387,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731942031 ",
"message": "<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=11.61.93.168 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.ccr-bhm.org/\"] duser=\"-\" src=111.122.207.243 spt=35387 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=111.122.207.243 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:23.22.35.162",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "111.122.207.243",
"serverIP": "11.61.93.168",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=11.61.93.168 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=111.122.207.243 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=111.122.207.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:45:42 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=11.61.93.168 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=111.122.207.243 spt=35387 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:45:42 rt=1708731942031 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85c448f-a0ccfb69 cn2=35387 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=111.122.207.243 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 35387
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731942031
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:23.22.35.162', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 111.122.207.243
serverIP: 11.61.93.168
userName: - | Explain this syslog message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=179.222.172.16 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=139.131.123.154 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=139.131.123.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 9897,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1708731973001 ",
"message": "<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=179.222.172.16 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.aptv.org/\"] duser=\"-\" src=139.131.123.154 spt=9897 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)\" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=139.131.123.154 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"ProxyIP:3.224.220.101",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "139.131.123.154",
"serverIP": "179.222.172.16",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=179.222.172.16 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=139.131.123.154 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=139.131.123.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 23 17:46:13 WAFirewall CEF:0|Barracuda|WAF|1210|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=179.222.172.16 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.aptv.org/"] duser="-" src=139.131.123.154 spt=9897 requestMethod=GET app=TLSv1.2 requestContext="-" start=Feb 23 2024 17:46:13 rt=1708731973001 request=/comm/AndarTrack.jsp requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)" dvchost=WAFirewall externalId=18dd85cbd89-d6b559d9 cn2=9897 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=139.131.123.154 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 9897
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1708731973001
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'ProxyIP:3.224.220.101', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 139.131.123.154
serverIP: 179.222.172.16
userName: - | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=140.201.160.135 dst=148.82.116.174 protocol=tcp sport=54287 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=140.201.160.135 dst=148.82.116.174 protocol=tcp sport=54287 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54287,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "140.201.160.135",
"serverIP": "148.82.116.174"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=140.201.160.135 dst=148.82.116.174 protocol=tcp sport=54287 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=140.201.160.135 dst=148.82.116.174 protocol=tcp sport=54287 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54287
protocol: 6
streamName: meraki_l7_firewall
clientIP: 140.201.160.135
serverIP: 148.82.116.174 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=92.86.222.177 dst=7.225.108.64 protocol=tcp sport=54287 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=92.86.222.177 dst=7.225.108.64 protocol=tcp sport=54287 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54287,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "92.86.222.177",
"serverIP": "7.225.108.64"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=92.86.222.177 dst=7.225.108.64 protocol=tcp sport=54287 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=92.86.222.177 dst=7.225.108.64 protocol=tcp sport=54287 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54287
protocol: 6
streamName: meraki_l7_firewall
clientIP: 92.86.222.177
serverIP: 7.225.108.64 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=208.146.190.74 dst=235.107.18.52 protocol=tcp sport=54287 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=208.146.190.74 dst=235.107.18.52 protocol=tcp sport=54287 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54287,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "208.146.190.74",
"serverIP": "235.107.18.52"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=208.146.190.74 dst=235.107.18.52 protocol=tcp sport=54287 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=208.146.190.74 dst=235.107.18.52 protocol=tcp sport=54287 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54287
protocol: 6
streamName: meraki_l7_firewall
clientIP: 208.146.190.74
serverIP: 235.107.18.52 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=174.240.204.179 dst=49.217.11.20 protocol=tcp sport=54287 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=174.240.204.179 dst=49.217.11.20 protocol=tcp sport=54287 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54287,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "174.240.204.179",
"serverIP": "49.217.11.20"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=174.240.204.179 dst=49.217.11.20 protocol=tcp sport=54287 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890630.720255343 M24_MX67C_ForestPark l7_firewall src=174.240.204.179 dst=49.217.11.20 protocol=tcp sport=54287 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54287
protocol: 6
streamName: meraki_l7_firewall
clientIP: 174.240.204.179
serverIP: 49.217.11.20 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=90.194.180.199 dst=219.161.82.65 protocol=tcp sport=54400 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=90.194.180.199 dst=219.161.82.65 protocol=tcp sport=54400 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54400,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "90.194.180.199",
"serverIP": "219.161.82.65"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=90.194.180.199 dst=219.161.82.65 protocol=tcp sport=54400 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=90.194.180.199 dst=219.161.82.65 protocol=tcp sport=54400 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54400
protocol: 6
streamName: meraki_l7_firewall
clientIP: 90.194.180.199
serverIP: 219.161.82.65 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=25.104.128.47 dst=148.145.219.4 protocol=tcp sport=54400 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=25.104.128.47 dst=148.145.219.4 protocol=tcp sport=54400 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54400,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "25.104.128.47",
"serverIP": "148.145.219.4"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=25.104.128.47 dst=148.145.219.4 protocol=tcp sport=54400 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=25.104.128.47 dst=148.145.219.4 protocol=tcp sport=54400 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54400
protocol: 6
streamName: meraki_l7_firewall
clientIP: 25.104.128.47
serverIP: 148.145.219.4 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=122.224.114.208 dst=224.61.114.112 protocol=tcp sport=54400 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=122.224.114.208 dst=224.61.114.112 protocol=tcp sport=54400 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54400,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "122.224.114.208",
"serverIP": "224.61.114.112"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=122.224.114.208 dst=224.61.114.112 protocol=tcp sport=54400 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=122.224.114.208 dst=224.61.114.112 protocol=tcp sport=54400 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54400
protocol: 6
streamName: meraki_l7_firewall
clientIP: 122.224.114.208
serverIP: 224.61.114.112 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=203.159.64.152 dst=209.0.131.78 protocol=tcp sport=54400 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=203.159.64.152 dst=209.0.131.78 protocol=tcp sport=54400 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54400,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "203.159.64.152",
"serverIP": "209.0.131.78"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=203.159.64.152 dst=209.0.131.78 protocol=tcp sport=54400 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657890636.983892383 M24_MX67C_ForestPark l7_firewall src=203.159.64.152 dst=209.0.131.78 protocol=tcp sport=54400 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54400
protocol: 6
streamName: meraki_l7_firewall
clientIP: 203.159.64.152
serverIP: 209.0.131.78 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=66.146.50.172 dst=6.197.133.70 protocol=tcp sport=51212 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=66.146.50.172 dst=6.197.133.70 protocol=tcp sport=51212 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51212,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "66.146.50.172",
"serverIP": "6.197.133.70"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=66.146.50.172 dst=6.197.133.70 protocol=tcp sport=51212 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=66.146.50.172 dst=6.197.133.70 protocol=tcp sport=51212 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51212
protocol: 6
streamName: meraki_l7_firewall
clientIP: 66.146.50.172
serverIP: 6.197.133.70 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=64.39.24.28 dst=63.221.47.64 protocol=tcp sport=51212 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=64.39.24.28 dst=63.221.47.64 protocol=tcp sport=51212 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51212,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "64.39.24.28",
"serverIP": "63.221.47.64"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=64.39.24.28 dst=63.221.47.64 protocol=tcp sport=51212 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=64.39.24.28 dst=63.221.47.64 protocol=tcp sport=51212 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51212
protocol: 6
streamName: meraki_l7_firewall
clientIP: 64.39.24.28
serverIP: 63.221.47.64 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=28.207.243.230 dst=48.79.15.171 protocol=tcp sport=51212 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=28.207.243.230 dst=48.79.15.171 protocol=tcp sport=51212 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51212,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "28.207.243.230",
"serverIP": "48.79.15.171"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=28.207.243.230 dst=48.79.15.171 protocol=tcp sport=51212 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=28.207.243.230 dst=48.79.15.171 protocol=tcp sport=51212 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51212
protocol: 6
streamName: meraki_l7_firewall
clientIP: 28.207.243.230
serverIP: 48.79.15.171 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=130.129.172.11 dst=126.82.71.231 protocol=tcp sport=51212 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=130.129.172.11 dst=126.82.71.231 protocol=tcp sport=51212 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51212,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "130.129.172.11",
"serverIP": "126.82.71.231"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=130.129.172.11 dst=126.82.71.231 protocol=tcp sport=51212 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1664984802.881031331 M96_MX67C_MECLawrencevilleMain l7_firewall src=130.129.172.11 dst=126.82.71.231 protocol=tcp sport=51212 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51212
protocol: 6
streamName: meraki_l7_firewall
clientIP: 130.129.172.11
serverIP: 126.82.71.231 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t228.91.105.156\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.91.105.156","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.812Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t228.91.105.156\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"228.91.105.156\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808640,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808640",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "228.91.105.156",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t228.91.105.156\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.91.105.156","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t228.91.105.156\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"228.91.105.156","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808640
streamName: microsoft-windows-security-auditing
clientIP: 228.91.105.156
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t54.84.87.14\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"54.84.87.14","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.812Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t54.84.87.14\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"54.84.87.14\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808640,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808640",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "54.84.87.14",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t54.84.87.14\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"54.84.87.14","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t54.84.87.14\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"54.84.87.14","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808640
streamName: microsoft-windows-security-auditing
clientIP: 54.84.87.14
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t172.12.149.134\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"172.12.149.134","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.805Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t172.12.149.134\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"172.12.149.134\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808639,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808639",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "172.12.149.134",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t172.12.149.134\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"172.12.149.134","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t172.12.149.134\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"172.12.149.134","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808639
streamName: microsoft-windows-security-auditing
clientIP: 172.12.149.134
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t249.243.183.58\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"249.243.183.58","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.805Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t249.243.183.58\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"249.243.183.58\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808639,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808639",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "249.243.183.58",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t249.243.183.58\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"249.243.183.58","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t249.243.183.58\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"249.243.183.58","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808639
streamName: microsoft-windows-security-auditing
clientIP: 249.243.183.58
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t231.59.36.1\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.59.36.1","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.812Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t231.59.36.1\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"231.59.36.1\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808640,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808640",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "231.59.36.1",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t231.59.36.1\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.59.36.1","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t231.59.36.1\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"231.59.36.1","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808640
streamName: microsoft-windows-security-auditing
clientIP: 231.59.36.1
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t43.32.117.220\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"43.32.117.220","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.812Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t43.32.117.220\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"43.32.117.220\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808640,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808640",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "43.32.117.220",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t43.32.117.220\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"43.32.117.220","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.812Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t43.32.117.220\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"43.32.117.220","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808640,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52686
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 86808640
streamName: microsoft-windows-security-auditing
clientIP: 43.32.117.220
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-04-25T16:12:24.805Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-04-25T16:12:25.551Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tLT51387\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tLT51387\n\tSource Network Address:\t245.11.144.192\n\tSource Port:\t\t52686\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"245.11.144.192","IpPort":"52686","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"LT51387","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"LT51387"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":86808639,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52686,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-04-25T16:12:24.805Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-04-25T16:12:25.551Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tLT51387\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tLT51387\\n\\tSource Network Address:\\t245.11.144.192\\n\\tSource Port:\\t\\t52686\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"245.11.144.192\",\"IpPort\":\"52686\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"LT51387\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"LT51387\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":86808639,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "86808639",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "245.11.144.192",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.