input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"200.38.200.85","externalIp":"203.1.208.49","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=200.38.200.85 ::: serverIP=203.1.208.49 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:32.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 200.38.200.85
serverIP: 203.1.208.49
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"117.142.99.94","externalIp":"209.5.142.219","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:32.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"117.142.99.94\",\"externalIp\":\"209.5.142.219\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "117.142.99.94",
"serverIP": "209.5.142.219",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"117.142.99.94","externalIp":"209.5.142.219","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"117.142.99.94","externalIp":"209.5.142.219","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=117.142.99.94 ::: serverIP=209.5.142.219 ::: userName=charlie ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:32.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 117.142.99.94
serverIP: 209.5.142.219
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"204.173.132.49","externalIp":"198.87.21.240","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"204.173.132.49\",\"externalIp\":\"198.87.21.240\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "204.173.132.49",
"serverIP": "198.87.21.240",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"204.173.132.49","externalIp":"198.87.21.240","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"204.173.132.49","externalIp":"198.87.21.240","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=204.173.132.49 ::: serverIP=198.87.21.240 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 204.173.132.49
serverIP: 198.87.21.240
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"22.170.5.191","externalIp":"14.106.111.205","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T17:15:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535289661,\"originType\":\"Network Devices\",\"internalIp\":\"22.170.5.191\",\"externalIp\":\"14.106.111.205\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T17:15:06.000Z\"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "22.170.5.191",
"serverIP": "14.106.111.205",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"22.170.5.191","externalIp":"14.106.111.205","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535289661,"originType":"Network Devices","internalIp":"22.170.5.191","externalIp":"14.106.111.205","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T17:15:06.000Z"} ::: clientIP=22.170.5.191 ::: serverIP=14.106.111.205 ::: userName=johndoe ::: created_at=2022-05-24T17:15:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T17:15:06.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T17:15:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 22.170.5.191
serverIP: 14.106.111.205
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"115.15.60.97","externalIp":"141.131.102.80","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:32.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"115.15.60.97\",\"externalIp\":\"141.131.102.80\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "115.15.60.97",
"serverIP": "141.131.102.80",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"115.15.60.97","externalIp":"141.131.102.80","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"115.15.60.97","externalIp":"141.131.102.80","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=115.15.60.97 ::: serverIP=141.131.102.80 ::: userName=nighthawk ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:32.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 115.15.60.97
serverIP: 141.131.102.80
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"186.240.203.233","externalIp":"207.142.153.238","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:32.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"186.240.203.233\",\"externalIp\":\"207.142.153.238\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "186.240.203.233",
"serverIP": "207.142.153.238",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"186.240.203.233","externalIp":"207.142.153.238","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"186.240.203.233","externalIp":"207.142.153.238","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=186.240.203.233 ::: serverIP=207.142.153.238 ::: userName=johndoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:32.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 186.240.203.233
serverIP: 207.142.153.238
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"227.21.49.48","externalIp":"231.90.243.127","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:32.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"227.21.49.48\",\"externalIp\":\"231.90.243.127\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "227.21.49.48",
"serverIP": "231.90.243.127",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"227.21.49.48","externalIp":"231.90.243.127","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"227.21.49.48","externalIp":"231.90.243.127","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=227.21.49.48 ::: serverIP=231.90.243.127 ::: userName=bob ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:32.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 227.21.49.48
serverIP: 231.90.243.127
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"148.97.216.7","externalIp":"122.62.222.110","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:32.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":535533968,\"originType\":\"Network Devices\",\"internalIp\":\"148.97.216.7\",\"externalIp\":\"122.62.222.110\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:32.000Z\"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "148.97.216.7",
"serverIP": "122.62.222.110",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"148.97.216.7","externalIp":"122.62.222.110","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":535533968,"originType":"Network Devices","internalIp":"148.97.216.7","externalIp":"122.62.222.110","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:32.000Z"} ::: clientIP=148.97.216.7 ::: serverIP=122.62.222.110 ::: userName=janedoe ::: created_at=2022-05-24T16:55:32.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:32.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:32.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 148.97.216.7
serverIP: 122.62.222.110
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"31.44.27.118","externalIp":"32.54.114.84","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"31.44.27.118\",\"externalIp\":\"32.54.114.84\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "31.44.27.118",
"serverIP": "32.54.114.84",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"31.44.27.118","externalIp":"32.54.114.84","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"31.44.27.118","externalIp":"32.54.114.84","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=31.44.27.118 ::: serverIP=32.54.114.84 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 31.44.27.118
serverIP: 32.54.114.84
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"203.185.189.127","externalIp":"58.248.32.237","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"203.185.189.127\",\"externalIp\":\"58.248.32.237\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "203.185.189.127",
"serverIP": "58.248.32.237",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"203.185.189.127","externalIp":"58.248.32.237","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"203.185.189.127","externalIp":"58.248.32.237","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=203.185.189.127 ::: serverIP=58.248.32.237 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 203.185.189.127
serverIP: 58.248.32.237
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"105.180.114.74","externalIp":"13.82.27.251","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"105.180.114.74\",\"externalIp\":\"13.82.27.251\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "105.180.114.74",
"serverIP": "13.82.27.251",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"105.180.114.74","externalIp":"13.82.27.251","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"105.180.114.74","externalIp":"13.82.27.251","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=105.180.114.74 ::: serverIP=13.82.27.251 ::: userName=fish ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 105.180.114.74
serverIP: 13.82.27.251
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"221.66.183.248","externalIp":"26.162.121.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"221.66.183.248\",\"externalIp\":\"26.162.121.145\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "221.66.183.248",
"serverIP": "26.162.121.145",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"221.66.183.248","externalIp":"26.162.121.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"221.66.183.248","externalIp":"26.162.121.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=221.66.183.248 ::: serverIP=26.162.121.145 ::: userName=johndoe ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 221.66.183.248
serverIP: 26.162.121.145
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"78.213.2.223","externalIp":"69.180.77.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-27T16:54:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"78.213.2.223\",\"externalIp\":\"69.180.77.227\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "78.213.2.223",
"serverIP": "69.180.77.227",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"78.213.2.223","externalIp":"69.180.77.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"78.213.2.223","externalIp":"69.180.77.227","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=78.213.2.223 ::: serverIP=69.180.77.227 ::: userName=alice ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-27T16:54:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 78.213.2.223
serverIP: 69.180.77.227
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"81.162.95.104","externalIp":"217.194.76.254","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-27T16:54:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"81.162.95.104\",\"externalIp\":\"217.194.76.254\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "81.162.95.104",
"serverIP": "217.194.76.254",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"81.162.95.104","externalIp":"217.194.76.254","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"81.162.95.104","externalIp":"217.194.76.254","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=81.162.95.104 ::: serverIP=217.194.76.254 ::: userName=janedoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-27T16:54:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 81.162.95.104
serverIP: 217.194.76.254
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.127.47.156","externalIp":"166.59.237.48","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T19:08:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"254.127.47.156\",\"externalIp\":\"166.59.237.48\",\"categories\":[\"Malware\",\"Newly Seen Domains\"],\"tags\":[],\"destination\":\"url7169.kwikqy.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T19:08:49.000Z\"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url7169.kwikqy.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url7169.kwikqy.com",
"vendorcode": "MalwareNewly Seen Domains",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "254.127.47.156",
"serverIP": "166.59.237.48",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.127.47.156","externalIp":"166.59.237.48","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"254.127.47.156","externalIp":"166.59.237.48","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=254.127.47.156 ::: serverIP=166.59.237.48 ::: userName=fish ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T19:08:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url7169.kwikqy.com
messagetype: firewall_action
severitycode: 2
fqdn: url7169.kwikqy.com
vendorcode: MalwareNewly Seen Domains
action: block
streamName: OpenDNS Detection
clientIP: 254.127.47.156
serverIP: 166.59.237.48
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"25.32.199.159","externalIp":"177.90.218.36","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-23T19:08:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"25.32.199.159\",\"externalIp\":\"177.90.218.36\",\"categories\":[\"Malware\",\"Newly Seen Domains\"],\"tags\":[],\"destination\":\"url7169.kwikqy.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-23T19:08:49.000Z\"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url7169.kwikqy.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url7169.kwikqy.com",
"vendorcode": "MalwareNewly Seen Domains",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "25.32.199.159",
"serverIP": "177.90.218.36",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"25.32.199.159","externalIp":"177.90.218.36","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url7169.kwikqy.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"25.32.199.159","externalIp":"177.90.218.36","categories":["Malware","Newly Seen Domains"],"tags":[],"destination":"url7169.kwikqy.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-23T19:08:49.000Z"} ::: clientIP=25.32.199.159 ::: serverIP=177.90.218.36 ::: userName=charlie ::: created_at=2022-06-23T19:08:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNewly Seen Domains ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-23T19:08:49.000Z ::: serverHostname=url7169.kwikqy.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-23T19:08:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url7169.kwikqy.com
messagetype: firewall_action
severitycode: 2
fqdn: url7169.kwikqy.com
vendorcode: MalwareNewly Seen Domains
action: block
streamName: OpenDNS Detection
clientIP: 25.32.199.159
serverIP: 177.90.218.36
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"72.122.167.72","externalIp":"144.42.204.250","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"72.122.167.72\",\"externalIp\":\"144.42.204.250\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "72.122.167.72",
"serverIP": "144.42.204.250",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"72.122.167.72","externalIp":"144.42.204.250","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"72.122.167.72","externalIp":"144.42.204.250","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=72.122.167.72 ::: serverIP=144.42.204.250 ::: userName=nighthawk ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 72.122.167.72
serverIP: 144.42.204.250
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"108.242.135.200","externalIp":"96.108.87.75","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-11T15:49:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":539210895,\"originType\":\"AD Users\",\"internalIp\":\"108.242.135.200\",\"externalIp\":\"96.108.87.75\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-11T15:49:58.000Z\"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "108.242.135.200",
"serverIP": "96.108.87.75",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"108.242.135.200","externalIp":"96.108.87.75","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":539210895,"originType":"AD Users","internalIp":"108.242.135.200","externalIp":"96.108.87.75","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-11T15:49:58.000Z"} ::: clientIP=108.242.135.200 ::: serverIP=96.108.87.75 ::: userName=charlie ::: created_at=2022-08-11T15:49:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-11T15:49:58.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-11T15:49:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 108.242.135.200
serverIP: 96.108.87.75
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"6.228.75.122","externalIp":"212.239.249.137","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-27T16:54:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"6.228.75.122\",\"externalIp\":\"212.239.249.137\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "6.228.75.122",
"serverIP": "212.239.249.137",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"6.228.75.122","externalIp":"212.239.249.137","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"6.228.75.122","externalIp":"212.239.249.137","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=6.228.75.122 ::: serverIP=212.239.249.137 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-27T16:54:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 6.228.75.122
serverIP: 212.239.249.137
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"19.226.215.66","externalIp":"86.4.36.245","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-27T16:54:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"19.226.215.66\",\"externalIp\":\"86.4.36.245\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "19.226.215.66",
"serverIP": "86.4.36.245",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"19.226.215.66","externalIp":"86.4.36.245","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"19.226.215.66","externalIp":"86.4.36.245","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=19.226.215.66 ::: serverIP=86.4.36.245 ::: userName=charlie ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-27T16:54:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 19.226.215.66
serverIP: 86.4.36.245
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"94.33.92.67","externalIp":"185.248.142.44","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-27T16:54:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"94.33.92.67\",\"externalIp\":\"185.248.142.44\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "94.33.92.67",
"serverIP": "185.248.142.44",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"94.33.92.67","externalIp":"185.248.142.44","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"94.33.92.67","externalIp":"185.248.142.44","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=94.33.92.67 ::: serverIP=185.248.142.44 ::: userName=johndoe ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-27T16:54:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 94.33.92.67
serverIP: 185.248.142.44
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"23.15.11.4","externalIp":"141.30.99.228","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-27T16:54:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={\"originId\":535422304,\"originType\":\"Network Devices\",\"internalIp\":\"23.15.11.4\",\"externalIp\":\"141.30.99.228\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"plants.appcnt.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-27T16:54:20.000Z\"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "plants.appcnt.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "plants.appcnt.com",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "23.15.11.4",
"serverIP": "141.30.99.228",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"23.15.11.4","externalIp":"141.30.99.228","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=plants.appcnt.com ::: action=BLOCKED ::: message={"originId":535422304,"originType":"Network Devices","internalIp":"23.15.11.4","externalIp":"141.30.99.228","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"plants.appcnt.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-27T16:54:20.000Z"} ::: clientIP=23.15.11.4 ::: serverIP=141.30.99.228 ::: userName=fish ::: created_at=2022-07-27T16:54:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-27T16:54:20.000Z ::: serverHostname=plants.appcnt.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-27T16:54:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: plants.appcnt.com
messagetype: firewall_action
severitycode: 2
fqdn: plants.appcnt.com
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 23.15.11.4
serverIP: 141.30.99.228
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"9.78.81.226","externalIp":"213.120.187.56","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"9.78.81.226\",\"externalIp\":\"213.120.187.56\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "9.78.81.226",
"serverIP": "213.120.187.56",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"9.78.81.226","externalIp":"213.120.187.56","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"9.78.81.226","externalIp":"213.120.187.56","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=9.78.81.226 ::: serverIP=213.120.187.56 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 9.78.81.226
serverIP: 213.120.187.56
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"61.66.184.122","externalIp":"229.173.181.93","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"61.66.184.122\",\"externalIp\":\"229.173.181.93\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "61.66.184.122",
"serverIP": "229.173.181.93",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"61.66.184.122","externalIp":"229.173.181.93","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"61.66.184.122","externalIp":"229.173.181.93","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=61.66.184.122 ::: serverIP=229.173.181.93 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 61.66.184.122
serverIP: 229.173.181.93
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"95.14.92.21","externalIp":"179.58.223.161","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"95.14.92.21\",\"externalIp\":\"179.58.223.161\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "95.14.92.21",
"serverIP": "179.58.223.161",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"95.14.92.21","externalIp":"179.58.223.161","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"95.14.92.21","externalIp":"179.58.223.161","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=95.14.92.21 ::: serverIP=179.58.223.161 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 95.14.92.21
serverIP: 179.58.223.161
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"105.68.88.153","externalIp":"80.9.121.111","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"105.68.88.153\",\"externalIp\":\"80.9.121.111\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "105.68.88.153",
"serverIP": "80.9.121.111",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"105.68.88.153","externalIp":"80.9.121.111","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"105.68.88.153","externalIp":"80.9.121.111","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=105.68.88.153 ::: serverIP=80.9.121.111 ::: userName=johndoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 105.68.88.153
serverIP: 80.9.121.111
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"22.13.117.65","externalIp":"55.118.2.149","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"22.13.117.65\",\"externalIp\":\"55.118.2.149\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "22.13.117.65",
"serverIP": "55.118.2.149",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"22.13.117.65","externalIp":"55.118.2.149","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"22.13.117.65","externalIp":"55.118.2.149","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=22.13.117.65 ::: serverIP=55.118.2.149 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 22.13.117.65
serverIP: 55.118.2.149
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"217.126.93.62","externalIp":"174.33.9.164","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"217.126.93.62\",\"externalIp\":\"174.33.9.164\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "217.126.93.62",
"serverIP": "174.33.9.164",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"217.126.93.62","externalIp":"174.33.9.164","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"217.126.93.62","externalIp":"174.33.9.164","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=217.126.93.62 ::: serverIP=174.33.9.164 ::: userName=bob ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 217.126.93.62
serverIP: 174.33.9.164
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "122.141.110.3",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=122.141.110.3 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 122.141.110.3
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "59.173.109.243",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=59.173.109.243 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 59.173.109.243
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com",
"clientmac": "0a3ab18031e1",
"filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mumbrellaine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mumbrellaine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-18T15:34:44Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "110.230.190.166",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=110.230.190.166 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASUATWEB01.devnvi.paygoint.com
clientmac: 0a3ab18031e1
filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-18T15:34:44Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 110.230.190.166
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com",
"clientmac": "0a3ab18031e1",
"filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mstarkine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mstarkine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-18T15:34:44Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "156.159.216.143",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.159.216.143 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASUATWEB01.devnvi.paygoint.com
clientmac: 0a3ab18031e1
filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-18T15:34:44Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 156.159.216.143
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com",
"clientmac": "0a3ab18031e1",
"filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mwayneine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mwayneine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-18T15:34:44Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "100.140.169.26",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=100.140.169.26 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASUATWEB01.devnvi.paygoint.com
clientmac: 0a3ab18031e1
filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-18T15:34:44Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 100.140.169.26
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "52.245.56.17",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=52.245.56.17 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 52.245.56.17
userName: nighthawk | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.